Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

How to implement the kill chain use case methodology in your SIEM

‎11-07-2013 08:29 AM - edited ‎06-09-2015 01:23 PM

A “kill chain” describes the structure of an intrusion and the corresponding model.  The kill chain is a useful way to group disparate security events into a context that centers on the attacker and/or the attack. The HP SIEM Kill Chain Methodology consists of numerous phases of an attack for which use cases can be developed. 


These phases are:

  • Reconnaissance or anomaly communication from an external source to target hosts
  • Attack Delivery
  • Exploitation
  • Installation
  • Command and Control (C2)
  • Local compromise
  • Internal Reconnaissance
  • Lateral Movement
  • Establish Persistence
  • Stage and Exfiltration


The new HP SIEM Kill Chain use case methodology whitepaper defines each of these phases and then walks through two examples of an attack.  It outlines what rules can be set in your ArcSight SIEM at each stage of the kill chain to detect these attacks.  By setting up monitoring rules at multiple stages in the kill chain, you increase your chances of catching the attack in progress and ultimately reduce the risk of a successful attack.


Read the full whitepaper at: HP SIEM Kill Chain use case methodology

0 Kudos
About the Author


Nov 29 - Dec 1
Discover 2016 London
Learn how to thrive in a world of digital transformation at our biggest event of the year, Discover 2016 London, November 29 - December 1.
Read more
Each Month in 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during online Expert Days. Find information here about past, current, and upcoming Expert Da...
Read more
View all