9 Short links on Network Beacon Detection

In this post I share 9 links to resources related to Network Beacon detection.

Network beacons are continuous automated communications between 2 hosts. Network beacon detection focuses on identifying this automated traffic with the primary goal of aiding in detecting malware infections or adversary activity that have been missed by other controls.

Beacon detection is a useful building block analytic with many different use cases.

  • Threat Hunting and Malware command and control (C2) detection — aid in detecting malware missed by anti-virus products.
  • Detection of automated third party traffic — detection of ongoing automated traffic to third parties may reveal unknown or emerging business relationships.
  • Identify automated web application dependencies (within an enterprise or external to an enterprise)

Links:

–Jason
@jason_trost

The “short links” format was inspired by O’Reilly’s Four Short Links series.

This was originally published on 2022–01–16 my blog at covert.io.

--

--

--

Interests: Network security, Digital Forensics, Machine Learning, Big Data. retweets are not endorsements.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Token Sale —Account Registration

Protecting Your Online Data

{UPDATE} Táxi Piloto Dirigindo 2017 Hack Free Resources Generator

Cyber Diplomacy Challenges in The Recent Conflicts

Layered Farming on BORGSWAP.Exchange

Threat Hunting in the cloud with Azure Notebooks: supercharge your hunting skills using Jupyter.

Madagascar passport template in PSD format, fully editable

Strengthening Superfluid Protocol Security with Additional Third-Party Audits

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Jason Trost

Jason Trost

Interests: Network security, Digital Forensics, Machine Learning, Big Data. retweets are not endorsements.

More from Medium

Virtual Keyboard using computer vision

Microsoft Malware Kaggle challenge: Multiclass Classification and feature Enginnering.

Microsoft Sentinel Machine Learning (ML) based Threat Detection Rules

Digital Twins in Urban Farming