{"title":"Indicators of Compromise (IoCs) and Their Role in Attack Defence","authors":"K. Paine, O. Whitehouse, J. Sellwood, A. Shaw","doi":"10.17487/rfc9424","DOIUrl":null,"url":null,"abstract":"Cyber defenders frequently rely on Indicators of Compromise (IoCs) to identify, trace, and block malicious activity in networks or on endpoints. This draft reviews the fundamentals, opportunities, operational limitations, and best practices of IoC use. It highlights the need for IoCs to be detectable in implementations of Internet protocols, tools, and technologies - both for the IoCs’ initial discovery and their use in detection - and provides a foundation for new approaches to operational challenges in network security. Abstract Designing an efficient source address validation (SAV) filter requires minimizing false positives (i.e., avoiding dropping legitimate traffic) while maintaining directionality (see RFC8704). This document advances the technology for SAV filter design through a method that makes use of BGP UPDATE messages, Autonomous System Provider Authorization (ASPA), and Route Origin Authorization (ROA). The proposed method’s name is abbreviated as BAR-SAV. BAR-SAV can be used by network operators to derive more robust SAV filters and thus improve network resilience. Abstract Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. This is similar scan and could be perceived as aggressive. This document proposes a couple of simple techniques allowing any party or organization to understand what this unsolicited packet is, what is its purpose, and more importantly who to contact.","PeriodicalId":21471,"journal":{"name":"RFC","volume":"51 1","pages":"1-24"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"RFC","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17487/rfc9424","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
摘要
网络防御者经常依靠入侵指标(ioc)来识别、跟踪和阻止网络或端点上的恶意活动。本草案审查了国际奥委会使用的基础、机会、操作限制和最佳实践。它强调了在互联网协议、工具和技术的实现中对ioc进行检测的必要性——无论是对ioc的初始发现还是它们在检测中的使用——并为应对网络安全中操作挑战的新方法提供了基础。设计一个有效的源地址验证(SAV)过滤器需要最小化误报(即避免丢弃合法流量),同时保持方向性(见RFC8704)。本文提出了利用BGP UPDATE消息、ASPA (Autonomous System Provider Authorization)和ROA (Route Origin Authorization)的方法来设计SAV过滤器的技术。该方法的名称缩写为BAR-SAV。网络运营商可以使用BAR-SAV来获得更健壮的SAV滤波器,从而提高网络的弹性。互联网尺度的主动测量既可以针对合作方,也可以针对非合作方。这是类似的扫描,可以被认为是侵略性的。本文提出了一些简单的技术,允许任何一方或组织了解这个未经请求的数据包是什么,它的目的是什么,更重要的是与谁联系。
Indicators of Compromise (IoCs) and Their Role in Attack Defence
Cyber defenders frequently rely on Indicators of Compromise (IoCs) to identify, trace, and block malicious activity in networks or on endpoints. This draft reviews the fundamentals, opportunities, operational limitations, and best practices of IoC use. It highlights the need for IoCs to be detectable in implementations of Internet protocols, tools, and technologies - both for the IoCs’ initial discovery and their use in detection - and provides a foundation for new approaches to operational challenges in network security. Abstract Designing an efficient source address validation (SAV) filter requires minimizing false positives (i.e., avoiding dropping legitimate traffic) while maintaining directionality (see RFC8704). This document advances the technology for SAV filter design through a method that makes use of BGP UPDATE messages, Autonomous System Provider Authorization (ASPA), and Route Origin Authorization (ROA). The proposed method’s name is abbreviated as BAR-SAV. BAR-SAV can be used by network operators to derive more robust SAV filters and thus improve network resilience. Abstract Active measurements at Internet-scale can target either collaborating parties or non-collaborating ones. This is similar scan and could be perceived as aggressive. This document proposes a couple of simple techniques allowing any party or organization to understand what this unsolicited packet is, what is its purpose, and more importantly who to contact.