Generic DNS tunnel detected by Zeek

This rule is part of a beta feature. To learn more, contact Support.

Set up the zeek integration.

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Zeek generic DNS tunnel detected.

Strategy

This rule monitors Zeek logs for the generic DNS tunnel detector. The algorithm detects DNS tunnels without requiring use of signatures for every DNS tunneling tool. Since the algorithm measures information transfer, it is capable of detecting non-malicious tunnels that occur all the time. Attackers use DNS tunneling for command and control communications, as it is crucial to network operations and security monitoring visibility may be limited.

Triage and response

  1. Assess {{@dns.question.name}} domain reputation to determine if domain has been noted as malicious by vendors.
  2. Check for other signals from the originating device as a possible indication that the device has been compromised.
  3. If it is determined that the activity is malicious:
    • Block the domain, if it aligns with organization incident response processes.
    • Begin your organization’s incident response process and investigate.
PREVIEWING: Cyril-Bouchiat/add-vm-package-explorer-doc