[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: Re: [cti-cybox] Network flow object suggestions
True you can't model all the ddos connections in the sighting object, but my understanding is that you were only supposed to model a selection of connections within the sighting as examples of the connection if you were wanting to track connections. You wouldn't model all the connections you saw. In which case you would have 3 or 4 observed data objects, each with an example of one ddos connection in them (out something like that).
I don't like the idea of conflating yet another layer of 'multiplicity' into CybOX/STIX.
Cheers
Terry MacDonald
Cosive
I am unsure how you would encode a DDOS using sighting in this manner without duplicating the network connection, can you give an example?
-
Jason Keirstead
STSM, Product Architect, Security Intelligence, IBM Security Systems
www.ibm.com/security | www.securityintelligence.com
Without data, all you are is just another person with an opinion - Unknown
Terry MacDonald ---08/26/2016 04:18:57 PM---Which is what the multiplicity in the STIX sighting relationship object is for. We should keep the n
From: Terry MacDonald <terry.macdonald@cosive.com>
To: Jason Keirstead/CanEast/IBM@IBMCA
Cc: cti-cybox@lists.oasis-open.org, Bret Jordan <bret.jordan@bluecoat.com>
Date: 08/26/2016 04:18 PM
Subject: Re: [cti-cybox] Network flow object suggestions
Sent by: <cti-cybox@lists.oasis-open.org >
Which is what the multiplicity in the STIX sighting relationship object is for. We should keep the network flow object for recording one flow, and use the sighting for saying 'and other stuff like this'.Cheers
Terry MacDonald
Cosive
On 26/08/2016 22:13, "Jason Keirstead" <Jason.Keirstead@ca.ibm.com> wrote:Multiple sources and dests is not to handle multicast. It is an encoding optimization to handle DDOS and port scan attempts. Without it, to encode a DDOS you may have 100,000 duplicate objects.
Sent from IBM Verse
Jordan, Bret --- Re: [cti-cybox] Network flow object suggestions ---
From: "Jordan, Bret" <bret.jordan@bluecoat.com> To: "Terry MacDonald" <terry.macdonald@cosive.com> Cc: cti-cybox@lists.oasis-open.org Date: Thu, Aug 25, 2016 7:16 PM Subject: Re: [cti-cybox] Network flow object suggestions
Good catch, I have not really gotten to that object yet... So yes, I would agree, I am not sure why we would allow a list for the source/src/initiator
Thanks,
Bret
Bret Jordan CISSP
Director of Security Architecture and Standards | Office of the CTO
Blue Coat Systems
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."
On Aug 25, 2016, at 15:24, Terry MacDonald <terry.macdonald@cosive.com> wrote:
Hi all
I have some questions about the network flow object.
----
The first is about the multiplicity of the source_refs.
Multicast traffic always so comes from a single source. So does a network broadcast. So is there any reason to have the source as a list when there is always just one source? Am I missing something?
We should really change its name to src_ref, and restrict it to one object-ref.
----
The second is around the list of options in the protocols field. We should probably provide an open vocabulary taken from both the IANA protocol list and the IANA services list to provide people a list of common options they should use. Otherwise we'll hit problems like people putting in 'ip' rather than ipv4 or ipv6, which is ambiguous.
Cheers
Terry MacDonald
Cosive
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]