SPRING CLEANING
Managing Indicator Deprecation in ThreatConnect
Alex Valdivia
ThreatConnect Research Team
March 21, 2017
© 2017 ThreatConnect, Inc. All Rights Reserved.
Google Image Search: Roomba Time Lapse
© 2017 ThreatConnect, Inc. All Rights Reserved.
Table of Contents
Threat Ratings, Confidence, and Deprecation
• Threat and Confidence Ratings
• Indicator Deprecation
Why?
• 3 Reasons for Indicator Deprecation
• Scenario: VXVault Source
How?
• Deprecation Rule Configuration
• Deprecation Rule Approaches
• Additional Considerations and Best Practices
Resources
Questions
3
© 2017 ThreatConnect, Inc. All Rights Reserved.
Threat Ratings, Confidence, and Deprecation
4
© 2017 ThreatConnect, Inc. All Rights Reserved.
Threat and Confidence Ratings
Threat Ratings
• Threat Level of Indicator
• Scale of 0-5 Skulls
Confidence Ratings
• Confidence in Threat Rating
• Percentage scale of 0-100
© 2017 ThreatConnect, Inc. All Rights Reserved.
Threat Rating Best Practices
Threat Rating Factors
1. Capability
2. Determination
3. Progression
Threat Rating Scale
0 Skulls Unknown
1 Skull Suspicious
2 Skulls Low
3 Skulls Moderate
4 Skulls High
5 Skulls Critical
6
Blog: https://www.threatconnect.com/blog/best-practices-indicator-rating-and-confidence/
© 2017 ThreatConnect, Inc. All Rights Reserved.
Confidence Rating Best Practices
Confidence Rating Factors
1. Confirmation
2. Plausibility
3. Consistency
Confidence Rating Scale
0 Unknown
1 Discredited
2-29 Improbable
30-49 Doubtful
50-69 Possible
70-89 Probable
90-100 Confirmed
7
Blog: https://www.threatconnect.com/blog/best-practices-indicator-rating-and-confidence/
© 2017 ThreatConnect, Inc. All Rights Reserved.
Indicator Deprecation
• System for automatically lowering
confidence rating of indicators over time.
• Does not affect threat rating.
• Rules customizable by indicator type.
• Enabled at Org, Source, and Community
level.
• Requires Org Admin or Director role. Interval: 10 Days Confidence Amount: 10
© 2017 ThreatConnect, Inc. All Rights Reserved.
But Why?
9
© 2017 ThreatConnect, Inc. All Rights Reserved.
3 Reasons for Indicator Deprecation
1. Lower confidence to reflect indicator’s “staleness”
2. Automatically delete indicators you no longer care about
3. Your analysts don’t know about this feature and you
want them to think they’re slowly losing their minds
10
© 2017 ThreatConnect, Inc. All Rights Reserved.
Scenario: VXVault Source
11
● Open Source URL Feed
● 100 URLs per Day
● Default Rating: 3 Skulls
● Default Confidence: 80%
© 2017 ThreatConnect, Inc. All Rights Reserved.
Scenario: VXVault Source - No Deprecation
12
Day 1
100 URLs
Day 2
200 URLs
New URL
Old URL
Day 90
9K URLs
© 2017 ThreatConnect, Inc. All Rights Reserved.
Scenario: VXVault Source - With Deprecation
13
Day 1
100 URLs
Day 2
200 URLs
Day 90
9K URLs
X
X
X
X
X
© 2017 ThreatConnect, Inc. All Rights Reserved.
But How?
14
© 2017 ThreatConnect, Inc. All Rights Reserved.
Deprecation Rule Configuration - Org
15
© 2017 ThreatConnect, Inc. All Rights Reserved.
Deprecation Rule Configuration - Source/Community
16
© 2017 ThreatConnect, Inc. All Rights Reserved.
Deprecation Rule
Configuration
● Indicator Type
○ 10 Types
● Interval
○ Days
● Confidence Amount
○ 1-100
● Percentage
○ Based on current
confidence rating
● Recurring
● Delete At Minimum (Zero)
● Update Chart Upon Deletion
17
© 2017 ThreatConnect, Inc. All Rights Reserved.
Deprecation Rule Approaches
Arbitrary Starting Confidence - Control Deprecation Rate
• Appropriate for manually created indicators, indicators shared by other users.
• I want to lower the confidence of Hosts by 10 every 10 days, and delete when
confidence reaches zero.
Known Starting Confidence - Control Timing of Confidence Changes, Deletions
• Appropriate for ThreatConnect Sources, HTTP Scraper, TAXII, API Integrations.
• I want URL indicators to be deleted in 60 days.
• I want the confidence of IP Addresses to change from Probable to Possible in
10 days.
18
© 2017 ThreatConnect, Inc. All Rights Reserved.
Deprecation Rules: Additional Considerations
Not All Indicators Are Created Equal
• URLs vs IP Addresses vs Domains
• Pyramid of Pain...ish
Not All Feeds Are Created Equal
• Malware Domain Feed
• Phishing URL Feed
• Scanning IP Feed
19
SlowerDeprecation
FasterDeprecation
No Deprecation >
© 2017 ThreatConnect, Inc. All Rights Reserved.
Deprecation Rules: Research Team Best Practices
20
Indicator
Types
Probable >
Possible
Deletion Interval (Days) Deprecation
Amount
Address, ASN,
CIDR
55 days Yes 11 6
URL, Host 110 days No 11 3
Email Address 225 days No 30 4
File, Mutex,
Registry Key, User
Agent
N/A N/A N/A N/A
Our team commonly uses the settings below for deprecation rules in ThreatConnect sources collecting
data from open source feeds. Do keep in mind, this is not a one-size-fits-all solution!
© 2017 ThreatConnect, Inc. All Rights Reserved.
Resources
● ThreatConnect Blog: Best Practices: Indicator Rating and Confidence
● ThreatConnect KnowledgeBase: Configuring Indicator Confidence Deprecation
● This slide deck!
● ThreatConnect Customer Success Representative
21
© 2017 ThreatConnect, Inc. All Rights Reserved.
Thank You
THREATCONNECT.COM

More Related Content

PPTX
Introduction to Malware Analysis
PPTX
Presentation on Web Attacks
PDF
Installing and Invoking Oracle Data Integrator (ODI) Public Web Services (whi...
PDF
iOS Application Security And Static Analysis.pdf
PPTX
Web application security
PPTX
SSRF For Bug Bounties
PPTX
Nessus-Vulnerability Tester
Introduction to Malware Analysis
Presentation on Web Attacks
Installing and Invoking Oracle Data Integrator (ODI) Public Web Services (whi...
iOS Application Security And Static Analysis.pdf
Web application security
SSRF For Bug Bounties
Nessus-Vulnerability Tester

What's hot (20)

PPTX
Owasp Top 10 A1: Injection
PDF
Cloud Summit Canada com Rodrigo Montoro
PDF
Carlos García - Pentesting Active Directory [rooted2018]
PPTX
Parametrization using TruClient Protocol
PPTX
OWASP Top 10 2021 - let's take a closer look by Glenn Wilson
PPTX
Thick client pentesting_the-hackers_meetup_version1.0pptx
PDF
Slides do Treinamento - OWASP TOP 10 (Em português)
PPTX
SSRF exploit the trust relationship
PDF
Nessus Basics
PPTX
CSRF Attack and Its Prevention technique in ASP.NET MVC
PPT
Introduction to Web Application Penetration Testing
PDF
SSRF workshop
PDF
Web vulnerabilities
PPTX
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
PDF
Practical DevSecOps - Arief Karfianto
PPTX
Security Testing Training With Examples
PPTX
Broken Authentication and Authorization(1).pptx
PPTX
Hunt for Domain Controller : Active Directory Pentesting Session
PDF
DNSSEC Validation Tutorial
PPTX
DevSecOps without DevOps is Just Security
Owasp Top 10 A1: Injection
Cloud Summit Canada com Rodrigo Montoro
Carlos García - Pentesting Active Directory [rooted2018]
Parametrization using TruClient Protocol
OWASP Top 10 2021 - let's take a closer look by Glenn Wilson
Thick client pentesting_the-hackers_meetup_version1.0pptx
Slides do Treinamento - OWASP TOP 10 (Em português)
SSRF exploit the trust relationship
Nessus Basics
CSRF Attack and Its Prevention technique in ASP.NET MVC
Introduction to Web Application Penetration Testing
SSRF workshop
Web vulnerabilities
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Practical DevSecOps - Arief Karfianto
Security Testing Training With Examples
Broken Authentication and Authorization(1).pptx
Hunt for Domain Controller : Active Directory Pentesting Session
DNSSEC Validation Tutorial
DevSecOps without DevOps is Just Security
Ad

Viewers also liked (20)

PPTX
[Defcon Russia #29] Алексей Тюрин - Spring autobinding
PDF
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
PPTX
[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...
PDF
DIY Education in Cyber Security
PPTX
The Art of Explanation: Behavioral models of infosec
PPTX
How to Become an InfoSec Autodidact
PPTX
Know Thyself: Optimizing Team Decision-Making
PDF
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
PPTX
It walks, It talks and it will conduct economic espionage by Greg Carpenter
PDF
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
PDF
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
PDF
Should I Patch My ICS?
PPTX
State of the Net
PPTX
Softcat Splunk Discovery Day Manchester, March 2017
PPTX
Building a Security Information and Event Management platform at Travis Per...
PDF
Linux Native, HTTP Aware Network Security
PDF
Windows 10 - Endpoint Security Improvements and the Implant Since Windows 2000
PDF
Volatile Memory: Behavioral Game Theory in Defensive Security
PDF
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
PDF
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...
DIY Education in Cyber Security
The Art of Explanation: Behavioral models of infosec
How to Become an InfoSec Autodidact
Know Thyself: Optimizing Team Decision-Making
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
It walks, It talks and it will conduct economic espionage by Greg Carpenter
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
Should I Patch My ICS?
State of the Net
Softcat Splunk Discovery Day Manchester, March 2017
Building a Security Information and Event Management platform at Travis Per...
Linux Native, HTTP Aware Network Security
Windows 10 - Endpoint Security Improvements and the Implant Since Windows 2000
Volatile Memory: Behavioral Game Theory in Defensive Security
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
Ad

Similar to Managing Indicator Deprecation in ThreatConnect (7)

PDF
Exposure Index
PDF
SAFe Program Level Metrics
PDF
Using DevOps' Intelligent Insights to Deliver Greater Business Value
PPT
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
PDF
Analytics Driven SIEM Workshop
PPTX
Taking Splunk to the Next Level - Management Breakout Session
PPTX
Taking Splunk to the Next Level - Management
Exposure Index
SAFe Program Level Metrics
Using DevOps' Intelligent Insights to Deliver Greater Business Value
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
Analytics Driven SIEM Workshop
Taking Splunk to the Next Level - Management Breakout Session
Taking Splunk to the Next Level - Management

More from ThreatConnect (14)

PPTX
Advanced Threat Hunting - BotConf 2017
PDF
Save Time and Act Faster with Playbooks
PDF
Intelligence driven defense webinar
PDF
Does a Bear Leak in the Woods?
PPTX
Operationalizing Threat Intelligence to Battle Persistent Actors
PPTX
Threat Intelligence is a Journey; Not a Destination
PPTX
Episode IV: A New Scope
PPTX
Open Source Malware Lab
PPTX
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
PPTX
Guccifer 2.0 the DNC Hack, and Fancy Bears, Oh My!
PPTX
Maltego Webinar Slides
PPTX
The Business Benefits of Threat Intelligence Webinar
PPTX
Dollars and Sense of Sharing Threat Intelligence
PPTX
The Diamond Model for Intrusion Analysis - Threat Intelligence
Advanced Threat Hunting - BotConf 2017
Save Time and Act Faster with Playbooks
Intelligence driven defense webinar
Does a Bear Leak in the Woods?
Operationalizing Threat Intelligence to Battle Persistent Actors
Threat Intelligence is a Journey; Not a Destination
Episode IV: A New Scope
Open Source Malware Lab
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
Guccifer 2.0 the DNC Hack, and Fancy Bears, Oh My!
Maltego Webinar Slides
The Business Benefits of Threat Intelligence Webinar
Dollars and Sense of Sharing Threat Intelligence
The Diamond Model for Intrusion Analysis - Threat Intelligence

Recently uploaded (20)

PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
SaaS reusability assessment using machine learning techniques
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Configure Apache Mutual Authentication
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
LMS bot: enhanced learning management systems for improved student learning e...
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
future_of_ai_comprehensive_20250822032121.pptx
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Enhancing plagiarism detection using data pre-processing and machine learning...
Basics of Cloud Computing - Cloud Ecosystem
Improvisation in detection of pomegranate leaf disease using transfer learni...
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
NewMind AI Weekly Chronicles – August ’25 Week IV
SaaS reusability assessment using machine learning techniques
Comparative analysis of machine learning models for fake news detection in so...
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
sbt 2.0: go big (Scala Days 2025 edition)
Configure Apache Mutual Authentication
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
SGT Report The Beast Plan and Cyberphysical Systems of Control

Managing Indicator Deprecation in ThreatConnect

  • 1. SPRING CLEANING Managing Indicator Deprecation in ThreatConnect Alex Valdivia ThreatConnect Research Team March 21, 2017
  • 2. © 2017 ThreatConnect, Inc. All Rights Reserved. Google Image Search: Roomba Time Lapse
  • 3. © 2017 ThreatConnect, Inc. All Rights Reserved. Table of Contents Threat Ratings, Confidence, and Deprecation • Threat and Confidence Ratings • Indicator Deprecation Why? • 3 Reasons for Indicator Deprecation • Scenario: VXVault Source How? • Deprecation Rule Configuration • Deprecation Rule Approaches • Additional Considerations and Best Practices Resources Questions 3
  • 4. © 2017 ThreatConnect, Inc. All Rights Reserved. Threat Ratings, Confidence, and Deprecation 4
  • 5. © 2017 ThreatConnect, Inc. All Rights Reserved. Threat and Confidence Ratings Threat Ratings • Threat Level of Indicator • Scale of 0-5 Skulls Confidence Ratings • Confidence in Threat Rating • Percentage scale of 0-100
  • 6. © 2017 ThreatConnect, Inc. All Rights Reserved. Threat Rating Best Practices Threat Rating Factors 1. Capability 2. Determination 3. Progression Threat Rating Scale 0 Skulls Unknown 1 Skull Suspicious 2 Skulls Low 3 Skulls Moderate 4 Skulls High 5 Skulls Critical 6 Blog: https://www.threatconnect.com/blog/best-practices-indicator-rating-and-confidence/
  • 7. © 2017 ThreatConnect, Inc. All Rights Reserved. Confidence Rating Best Practices Confidence Rating Factors 1. Confirmation 2. Plausibility 3. Consistency Confidence Rating Scale 0 Unknown 1 Discredited 2-29 Improbable 30-49 Doubtful 50-69 Possible 70-89 Probable 90-100 Confirmed 7 Blog: https://www.threatconnect.com/blog/best-practices-indicator-rating-and-confidence/
  • 8. © 2017 ThreatConnect, Inc. All Rights Reserved. Indicator Deprecation • System for automatically lowering confidence rating of indicators over time. • Does not affect threat rating. • Rules customizable by indicator type. • Enabled at Org, Source, and Community level. • Requires Org Admin or Director role. Interval: 10 Days Confidence Amount: 10
  • 9. © 2017 ThreatConnect, Inc. All Rights Reserved. But Why? 9
  • 10. © 2017 ThreatConnect, Inc. All Rights Reserved. 3 Reasons for Indicator Deprecation 1. Lower confidence to reflect indicator’s “staleness” 2. Automatically delete indicators you no longer care about 3. Your analysts don’t know about this feature and you want them to think they’re slowly losing their minds 10
  • 11. © 2017 ThreatConnect, Inc. All Rights Reserved. Scenario: VXVault Source 11 ● Open Source URL Feed ● 100 URLs per Day ● Default Rating: 3 Skulls ● Default Confidence: 80%
  • 12. © 2017 ThreatConnect, Inc. All Rights Reserved. Scenario: VXVault Source - No Deprecation 12 Day 1 100 URLs Day 2 200 URLs New URL Old URL Day 90 9K URLs
  • 13. © 2017 ThreatConnect, Inc. All Rights Reserved. Scenario: VXVault Source - With Deprecation 13 Day 1 100 URLs Day 2 200 URLs Day 90 9K URLs X X X X X
  • 14. © 2017 ThreatConnect, Inc. All Rights Reserved. But How? 14
  • 15. © 2017 ThreatConnect, Inc. All Rights Reserved. Deprecation Rule Configuration - Org 15
  • 16. © 2017 ThreatConnect, Inc. All Rights Reserved. Deprecation Rule Configuration - Source/Community 16
  • 17. © 2017 ThreatConnect, Inc. All Rights Reserved. Deprecation Rule Configuration ● Indicator Type ○ 10 Types ● Interval ○ Days ● Confidence Amount ○ 1-100 ● Percentage ○ Based on current confidence rating ● Recurring ● Delete At Minimum (Zero) ● Update Chart Upon Deletion 17
  • 18. © 2017 ThreatConnect, Inc. All Rights Reserved. Deprecation Rule Approaches Arbitrary Starting Confidence - Control Deprecation Rate • Appropriate for manually created indicators, indicators shared by other users. • I want to lower the confidence of Hosts by 10 every 10 days, and delete when confidence reaches zero. Known Starting Confidence - Control Timing of Confidence Changes, Deletions • Appropriate for ThreatConnect Sources, HTTP Scraper, TAXII, API Integrations. • I want URL indicators to be deleted in 60 days. • I want the confidence of IP Addresses to change from Probable to Possible in 10 days. 18
  • 19. © 2017 ThreatConnect, Inc. All Rights Reserved. Deprecation Rules: Additional Considerations Not All Indicators Are Created Equal • URLs vs IP Addresses vs Domains • Pyramid of Pain...ish Not All Feeds Are Created Equal • Malware Domain Feed • Phishing URL Feed • Scanning IP Feed 19 SlowerDeprecation FasterDeprecation No Deprecation >
  • 20. © 2017 ThreatConnect, Inc. All Rights Reserved. Deprecation Rules: Research Team Best Practices 20 Indicator Types Probable > Possible Deletion Interval (Days) Deprecation Amount Address, ASN, CIDR 55 days Yes 11 6 URL, Host 110 days No 11 3 Email Address 225 days No 30 4 File, Mutex, Registry Key, User Agent N/A N/A N/A N/A Our team commonly uses the settings below for deprecation rules in ThreatConnect sources collecting data from open source feeds. Do keep in mind, this is not a one-size-fits-all solution!
  • 21. © 2017 ThreatConnect, Inc. All Rights Reserved. Resources ● ThreatConnect Blog: Best Practices: Indicator Rating and Confidence ● ThreatConnect KnowledgeBase: Configuring Indicator Confidence Deprecation ● This slide deck! ● ThreatConnect Customer Success Representative 21
  • 22. © 2017 ThreatConnect, Inc. All Rights Reserved. Thank You THREATCONNECT.COM