heroui logo

Spike in host-based traffic

Elastic Detection Rules

View Source
Summary
This detection rule leverages machine learning to identify sudden spikes in host-based traffic, which may indicate various security incidents such as compromised systems, DDoS attacks, malware infections, privilege escalation, or data exfiltration. The rule is set with a low severity score (21) but requires careful investigation due to the potential implications of such traffic anomalies. It incorporates data from the Elastic Defend integration and necessitates the proper setup of associated machine learning jobs to function effectively. False positives may arise from routine activities like system updates, scheduled backups, and legitimate high-volume data transfers, which should be monitored and filtered to reduce alert noise. The investigation process includes examining the timestamp and origin of anomalies, reviewing the affected host's logs for unusual connections, and assessing for any signs of unauthorized access.
Categories
  • Endpoint
  • Infrastructure
  • Network
Data Sources
  • Container
  • Process
  • Network Traffic
Created: 2025-02-18