This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
      • Netwitness XDR
      • EC-Council Training
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
    • Role-Based Training
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Discussions
  • NetWitness Community
  • Discussions
  • How to make correlation for horizontal IP scan.
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page

How to make correlation for horizontal IP scan.

Go to solution
Anonymous
Not applicable
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2013-10-02 10:00 AM

Hi everyone,

 

I would like to create correlation or something what can fire an alert when horizontal ip scan is in progress.

 

I have found that there is virus on one computer in our enviroment which tryes to acces computers in our network on IPs with incremental condition (xxx.xxx.xxx.1, xxx.xxx.xxx.2, xxx.xxx.xxx.3,...)

 

I tried to make correlation (inspired by IPv4 Vertical TCP Port Scan):

 

name="IPv4 Horizontal IP scan"

rule="tcp.dst exists"

thresh=u_count(tcp.dst)>10

key=ip.src,ip.dst

timewin="1 min" type=correlation

 

But there is some problem with tcp.dst in treshold.

 

Mabye I am totally wrong and it should be done by diferent way...

 

 

Can somebody help me please?

 

Thanks in advance

  • Community Thread
  • correlation
  • Decoder
  • Discussion
  • Forum Thread
  • horizontal
  • Malware
  • NetWitness
  • NW
  • NWP
  • RSA NetWitness
  • RSA NetWitness Platform
  • scan
  • virus
0 Likes
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
1 ACCEPTED SOLUTION

Accepted Solutions

Go to solution
RSAAdmin
RSAAdmin Beginner
Beginner
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2013-10-03 05:16 AM

Hi, DavidB12

"A horizontal scan is described as scan against a group of IPs for a single port."

So if you agree with that logic, the correlation would be like this:

 

rule=ip.dst exists && tcp.dstport exists

thresh=u_count(ip.dst)>10

key=ip.src,tcp.dstport

 

Here I count unique destination ip's for every pair of source ip+port. So if anyone is checking for an open port/trying to connect on many hosts from a single host it should fire.

View solution in original post

0 Likes
Reply
2 REPLIES 2

Go to solution
RSAAdmin
RSAAdmin Beginner
Beginner
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2013-10-03 05:16 AM

Hi, DavidB12

"A horizontal scan is described as scan against a group of IPs for a single port."

So if you agree with that logic, the correlation would be like this:

 

rule=ip.dst exists && tcp.dstport exists

thresh=u_count(ip.dst)>10

key=ip.src,tcp.dstport

 

Here I count unique destination ip's for every pair of source ip+port. So if anyone is checking for an open port/trying to connect on many hosts from a single host it should fire.

0 Likes
Reply

Go to solution
Anonymous
Not applicable
In response to RSAAdmin
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2013-10-04 07:02 AM

Hi n1k,

thank you for your help. Problem have been realy in me, when I try to use tcp.dst instead of ip.dst.

 

Thanks again and sorry for my noob mistake

0 Likes
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.