-
Threats and countermeasures lead to a more intense cybersecurity situation nowadays. As attackers frequently change network infrastructure and techniques they use, and the number of new attack groups has grown rapidly, static detection techniques won’t be able to cope with all these changes. IoA, based on dynamic detection with the help of TTP-related intelligence, can fit current situation better and has a great advantage dealing with attacks from unknown attackers.
-
Multi-dimensional Event Monitoring
Monitoring common behaviors related to attack such as processes linked with particular endpoint, operations on the file and registry, or other network behaviors, can also work at the bottom layer of the system to monitor specific attack-related behaviors such as script execution, lateral movement and escalation.
-
Reasonable/Realistic Operations Methods
Compared with the attack detection and intelligence framework of MITRE ATT&CK which is more theoretical, our (360) IoA intelligence is gathered from real scenarios, has been tested in countermeasures of APT campaigns, and has been tailored to focus on techniques the attacker tend to use. The number of noise points would be reduced.
-
Real-time Detection and Protection
Can detect attack-related behaviors at the endpoint in real time, and block such behaviors before they gain any impact. A timely and effective method to deal with risks such as ransomware and APTs.