
many destination hosts (i.e. destination IP addresses) 
were  involved  under  that  alert  category  (i.e.  30 
hosts). 
As  the  analyst  has  now found  out  that  there  is 
potential  web  attack  traffic  targeting  some  of  the 
company’s web  services,  the  next  step would  be to 
narrow down the search and verify if any of the web 
servers has  been  successfully compromised. To  do 
this the analyst searches for Access to a Potentially 
Vulnerable Web Application alerts among those 30 
destination  IP  addresses.  Eventually,  by  carefully 
examining  the  search  result  (i.e.  1,672  events  in 
total)  the  analyst  found  that  a  Cybercop  Scan 
activity (i.e. 2 events) was detected for a particular 
destination  IP  address;  the  analyst  has  now 
successfully identified the web server that has been 
potentially compromised. 
3.2  Use Case 2: Determine Type of 
Attack 
In  the  second  use  case  the  SOC  analyst  wants  to 
determine the actual type of attack or security breach 
on web servers that he/she suspected may have been 
compromised.  This  is  important  in  order  to  assess 
the  damage  that  could  have  been  caused  by 
successful  attack  and  to  allow  the  administrators 
take  suitable  mitigation  actions  such  as  blocking 
inbound  web  traffic  or  shutting  down  the  server 
completely. 
The analyst will first look for all Snort IDS alerts 
that  relate  to  Detection  of  a  Network  Scan 
classification (i.e. 694 events). This query results in 
a  list  of  matching  alerts  with  different  attack 
signature names, one of which catches the analyst’s 
attention, i.e. WEB_SERVER IIS 8.3 Filename With 
Wildcard  (Possible  File/Dir  Bruteforce)  with  22 
events.  The  analyst  then  retrieves  the  list  of 
destination  IP  addresses  reported  with  that  attack 
signature which indicates directory traversal activity 
(i.e. 16 IP addresses). 
The  analyst  now  needs  to  know  if  the  attacker 
was able to successfully compromise any of the IIS 
(Internet  Information  Services)  web  servers 
deployed  in  the  network.  He/she  starts looking  for 
alerts classified as Web Application Attack and spots 
a  set  of  alerts  with  signature  name  WEB-IIS 
Directory  Traversal  Attempt  (i.e.  874  events).  The 
analyst  collects  the  involved  29  destination  IP 
addresses  and  checks  them  against  the  list  of 
destination  IP  addresses  obtained  earlier  (i.e.  for 
WEB_SERVER IIS 8.3 Filename With Wildcard) in 
order to determine the actual servers that have been 
targeted by the attacker. 
This is a typical scenario, where the analyst has 
to compare alerts collected from one event possibly 
at network level with events at host level to verify 
that the network scanning activity detected as attacks 
towards web server’s directory traversal matches the 
attack  at  host  with  directory  traversal  attempt. 
Following the  comparison the analyst  identifies 15 
destination IP addresses that were involved in both 
attack signatures which  may  lead to root  access to 
the  web  server  using  the  Directory  Traversal 
method.  To  narrow  down  the  search  further,  the 
analyst may need to  investigate the system logs  to 
check  who  managed  to  log  into  the  system  and 
compare  the  login  time  with  the  collected  Snort 
alerts and gather more evidence of successful attack. 
4  ATTACK DETECTION TOOL 
4.1  Introduction 
Our  attack  detection  tool  allows  cyber-defence 
analysts  to  automate  the  process  of  correlating 
specific  security,  system  and  network  events  that 
may  have  been  logged  at  different  places  in  the 
network over short or long period of time. In order 
to correlate two separate events correctly an analyst 
normally needs to verify whether the same machine 
or device is involved in both events. For example, if 
there  are  some  IDS  alerts  involving  a  device  with 
particular IP address, the analyst may then want to 
check  whether  there  is  any  suspicious  outbound 
traffic  coming  from  that  device  in  subsequent 
periods  of  time.  Regular  checks  with  DHCP 
(Dynamic Host Configuration Protocol) records are 
thus  needed  to  make  sure  that  the  IP  address  still 
matches the  same  device.  The  tool helps  automate 
this type of checks and  correlates past events with 
subsequent series of new events to save analyst a lot 
of  time  in  monitoring  the  progress  of  potential 
attacks. 
4.2  Attack Detection Plan 
Attack  detection  plans  are  used  for  triggering  and 
automating the process of detecting various types of 
cyber-attacks. Each plan indicates a series of events 
that collectively may form logical steps and phases 
of cyber kill chain; the plan sets the conditions under 
which  the  events  could  be  correlated  with  each 
other, leading to certain conclusions, e.g. preparation 
for implanting a backdoor within the target system. 
Essentially  the  plan  represents  the  step-by-step 
process  of  investigating  cyber  incidents  that 
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
184