Security Products
Showing results for 
Search instead for 
Do you mean 

How to implement the kill chain use case methodology in your SIEM

Kerry_Matre ‎11-07-2013 08:29 AM - edited ‎06-09-2015 01:23 PM

A “kill chain” describes the structure of an intrusion and the corresponding model.  The kill chain is a useful way to group disparate security events into a context that centers on the attacker and/or the attack. The HP SIEM Kill Chain Methodology consists of numerous phases of an attack for which use cases can be developed. 


These phases are:killchain.png

  • Reconnaissance or anomaly communication from an external source to target hosts
  • Attack Delivery
  • Exploitation
  • Installation
  • Command and Control (C2)
  • Local compromise
  • Internal Reconnaissance
  • Lateral Movement
  • Establish Persistence
  • Stage and Exfiltration


The new HP SIEM Kill Chain use case methodology whitepaper defines each of these phases and then walks through two examples of an attack.  It outlines what rules can be set in your ArcSight SIEM at each stage of the kill chain to detect these attacks.  By setting up monitoring rules at multiple stages in the kill chain, you increase your chances of catching the attack in progress and ultimately reduce the risk of a successful attack.


Read the full whitepaper at: HP SIEM Kill Chain use case methodology

About the Author


Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
1-3 December 2015
Discover 2015 London
Discover 2015 in London, the ultimate showcase technology event for business and IT professionals to learn, connect, and grow.
Read more
November 2015
Software Online Expert Days
Join us online to talk directly with our Software experts.
Read more
View all