Monitor network traffic in order to detect adversary activity.
Network monitoring involves capturing network activity data, including capturing of server, firewall, and other relevant logs. A defender can then review them or send them to a centralized collection location for further analysis.
| ID | Description |
|---|---|
| DOS0198 | There is an opportunity to monitor network traffic for different protocols, anomalous traffic patterns, transfer of data, etc. to determine the presence of an adversary. |
| ID | Description |
|---|---|
| DUC0089 | A defender can monitor network traffic for anomalies associated with known MiTM behavior. |
| DUC0159 | A defender can monitor for systems establishing connections using encapsulated protocols not commonly used together such as RDP tunneled over TCP. |
| DUC0198 | The defender can implement network monitoring for and alert on anomalous traffic patterns, large or unexpected data transfers, and other activity that may reveal the presence of an adversary. |
| ID | Description |
|---|---|
| DPR0047 | Capture network logs for internet-facing devices and send those logs to a central collection location. |
| DPR0048 | Capture all network device (router, switches, proxy, etc.) logs on a decoy network and send those logs to a central collection location. |
ID![]() | Name | ATT&CK Tactics |
|---|---|---|
| T1021 | Remote Services | Lateral Movement |
| T1029 | Scheduled Transfer | Exfiltration |
| T1071 | Application Layer Protocol | Command and Control |
| T1205 | Traffic Signaling | Defense Evasion, Persistence, Command and Control |
| T1557 | Man-in-the-Middle | Credential Access, Collection |
| T1570 | Lateral Tool Transfer | Lateral Movement |
| T1571 | Non-Standard Port | Command and Control |
| T1572 | Protocol Tunneling | Command and Control |
| T1589 | Gather Victim Identity Information | Reconnaissance |
| T1590 | Gather Victim Network Information | Reconnaissance |
| T1595 | Active Scanning | Reconnaissance |
| T1599 | Network Boundary Bridging | Defense Evasion |
| T1600 | Weaken Encryption | Defense Evasion |