Network Intrusion Prevention

From attackics
Jump to navigation Jump to search
Network Intrusion Prevention
Mitigation
ID M1031
NIST SP 800-53 Rev. 4 SI-4
IEC 62443-3-3:2013 SR 6.2
IEC 62443-4-2:2019 CR 6.2

Description

Use intrusion detection signatures to block traffic at network boundaries.

In industrial control environments, network intrusion prevention should be configured so it will not disrupt protocols and communications responsible for real-time functions related to control or safety.


Techniques Addressed by Mitigation

NameUse
Commonly Used PortNetwork intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level. Signatures are often for unique indicators within protocols and may be based on the specific protocol used by a particular adversary or tool and will likely be different across various malware families and versions. Adversaries will likely change tool C2 signatures over time or construct protocols in such a way as to avoid detection by common defensive tools.1
Connection ProxyNetwork intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level. Signatures are often for unique indicators within protocols and may be based on the specific C2 protocol used by a particular adversary or tool and will likely be different across various malware families and versions. Adversaries will likely change tool C2 signatures over time or construct protocols in such a way as to avoid detection by common defensive tools.1
Man in the MiddleNetwork intrusion detection and prevention systems that can identify traffic patterns indicative of MiTM activity can be used to mitigate activity at the network level.
Network Service ScanningUse network intrusion detection/prevention systems to detect and prevent remote service scans.
Remote File CopyNetwork intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware or unusual data transfer over known tools and protocols like FTP can be used to mitigate activity at the network level. Signatures are often for unique indicators within protocols and may be based on the specific obfuscation technique used by a particular adversary or tool and will likely be different across various malware families and versions. Adversaries will likely change tool C2 signatures over time or construct protocols in such a way as to avoid detection by common defensive tools.1
Spearphishing AttachmentNetwork intrusion prevention systems and systems designed to scan and remove malicious email attachments can be used to block activity.
Standard Application Layer ProtocolNetwork intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
User ExecutionIf a link is being visited by a user, network intrusion prevention systems and systems designed to scan and remove malicious downloads can be used to block activity.