Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

How to implement the kill chain use case methodology in your SIEM

Kerry_Matre ‎11-07-2013 08:29 AM - edited ‎06-09-2015 01:23 PM

A “kill chain” describes the structure of an intrusion and the corresponding model.  The kill chain is a useful way to group disparate security events into a context that centers on the attacker and/or the attack. The HP SIEM Kill Chain Methodology consists of numerous phases of an attack for which use cases can be developed. 


These phases are:killchain.png

  • Reconnaissance or anomaly communication from an external source to target hosts
  • Attack Delivery
  • Exploitation
  • Installation
  • Command and Control (C2)
  • Local compromise
  • Internal Reconnaissance
  • Lateral Movement
  • Establish Persistence
  • Stage and Exfiltration


The new HP SIEM Kill Chain use case methodology whitepaper defines each of these phases and then walks through two examples of an attack.  It outlines what rules can be set in your ArcSight SIEM at each stage of the kill chain to detect these attacks.  By setting up monitoring rules at multiple stages in the kill chain, you increase your chances of catching the attack in progress and ultimately reduce the risk of a successful attack.


Read the full whitepaper at: HP SIEM Kill Chain use case methodology

About the Author


Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
January 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during the online Expert Days - see details below. Software experts do not monitor this foru...
Read more
See board event postings
Vivit Events - 2016
Learn about upcoming Vivit webinars and live events in 2016.
Read more
View all