Beginner's Guide To: Threat Intelligence
Beginner's Guide To: Threat Intelligence
Beginner's Guide To: Threat Intelligence
AlienVault defines threat intelligence as the actionable information that every IT team
needs to automatically detect threats in their network and prioritize the response to
those threats. It is the essential output of an organization’s threat research and analysis
process. Threat intelligence works by focusing the organization on the most important
threats facing their networks at any given time.
Threat intelligence comes in many forms. Some of the forms that we commonly see
today include IP addresses, domain names, DNS servers, URLs, file hashes, network
signatures, attack patterns, and actual written profiles of bad actors (like you might
find in a celebrity magazine). Each of these forms is developed in a different way,
some of which are automated and some of which involve pain-staking manual effort.
But they all can be considered threat intelligence.
Threat intelligence vendors come in many shapes and sizes as well.
Most threat intelligence sources fall into the following three classes:
All of the high profile breaches over the past few years have demonstrated that prevention
doesn’t always work, even for organizations with seemingly unlimited security budgets. New
threats arise every day. It is impossible for most organizations to keep up with the constant stream
of bad actors, their tools, and the infrastructure they use to compromise networks. In today’s
threat landscape, you need to assume your organization will be breached. So your priorities need
to shift towards strengthening your organization’s threat detection and response capability. And
the critical weapon you can deploy on this front is threat intelligence.
Threat intelligence is the essential output of an organization’s threat research and analysis
process. Threat data on its own is just data, lacking the analysis component. Without the threat
analysis, you won’t be able generate quality threat intelligence. It is this threat analysis that
is essential for converting the gigabytes and terabytes of event log data that every network
generates into specific, actionable information about threats. You need to be able to curate the
threat data, and combine it with supplemental information about attackers’ tools, methods, and
infrastructure, to produce quality threat intelligence. This enables you to instrument your security
program to effectively detect and respond to threats.
The Benefits of Threat
Intelligence for Your Organization
Threat intelligence has some major benefits for your organization. First and foremost,
as noted above, quality threat intelligence can accelerate your threat detection, prioritization
and response capabilities. Trying to detect threats is like looking for a needle in a haystack.
Unfortunately, with all of the data your organization collects, and the sophistication of the
attackers, the haystacks are getting bigger. Threat intelligence enables you to focus your
scarce resources on the highest priority threats facing your network.
In addition, new threats arise every day, and time is scarce. It is impossible for most
organizations to keep up with the latest threats. An effective threat intelligence capability
keeps you on top of these threats, improving your detection and response capability.
How Do We
Generate Threat
Intelligence
On Our Own?
So how can a typical organization
generate threat intelligence? To be sure,
generating threat intelligence is complex,
expensive, and time consuming.
Collecting security and network event data is relatively easy, with almost every operating
system, device and application generating a log file that log management systems can collect
and manage. Data correlation and analysis, on the other hand, is an extremely complex process.
Correlation is the process of identifying and linking seemingly unrelated events across a wide
range of data sources. It requires the use of sophisticated correlation directives to be able to find
relevant events buried within gigabytes or terabytes of log files.
Unfortunately, most IT teams often lack the technology and resources to automate the
correlation and analysis process. They often rely on simple collection of log files for their threat
analysis. Compounding this challenge is the fact that, for all IT teams, security is often just one
of many essential responsibilities to the organization. The IT team likely does not have the time or
technologies to manage and sort through the mountains of log data collected by all of their critical
systems. They also lack the time required to perform the necessary research to understand the
latest techniques and infrastructure used by bad actors to detect today’s emerging threats.
Given the extensive challenge in generating threat intelligence on your own, one option to
consider is to subscribe to an external threat intelligence service. This effectively outsources
your threat intelligence gathering process, which can save your team a lot of time and resources.
However, there are some downsides to this approach.
First and foremost, you will still need resources on hand to make this threat intelligence
meaningful for your organization. You will have to answer a range of questions about the data
you’re receiving, including:
Essentially, your staff will need to do the tuning of your security controls on their own.
What Are some Other Options from
External Threat Intelligence Vendors?
Secondly, you will need to integrate the threat intelligence information into your Security
Information and Event Management (SIEM) or security platform. This is not an easy process.
Instrumenting your security platform to ingest the threat intelligence information will take
time and resources.
Last but not least, these threat intelligence services are costly. These services start in the
tens of thousands and go into the millions. Most organizations simply do not have the budget
to take on this recurring expense.
AlienVault’s Approach to Threat Intelligence
AlienVault takes a comprehensive approach to our threat intelligence.
First, we collect over four million threat indicators every day, including malicious
IP addresses and URLs, domain names, malware samples, and suspicious files.
AlienVault aggregates this data in the Open Threat Exchange® (OTX™) platform,
AlienVault’s big data platform, from a wide range of sources, including:
We then use threat evaluation tools established and directed by the AlienVault Labs team
to test and validate specific threat indicators. These evaluation tools also leverage machine
learning capabilities and include a Malware Analyzer, a DNS Analyzer, a Web Analyzer,
and a Botnet Monitor. To take one example, we verify that a domain is distributing malware
using our Web Analyzer. We connect to the suspicious URL, analyze and then execute
the file, and if the file is malicious, we mark the server as malicious. We also use the latest
sandboxing techniques to identify and analyze malware samples.
The AlienVault Labs research team then conducts deeper qualitative and quantitative
analysis on the threats. For example, they will reverse-engineer a malware sample,
or conduct extensive research on particular threat actors and their infrastructure to detect
patterns of behavior and methods.
The AlienVault Labs team delivers
all information about the threats and
the attack infrastructure to the USM
platform via the USM Threat Intelligence
Subscription. The team regularly updates
eight coordinated rule sets, including
correlation directives, IDS signatures, and
response templates, which eliminates
the need for organizations to tune their
systems on their own.