Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
Expand Up @@ -203,3 +203,4 @@
/packages/influxdb @elastic/obs-service-integrations
/packages/jolokia_input @elastic/obs-service-integrations
/packages/ded @elastic/ml-ui
/packages/lmd @elastic/ml-ui
5 changes: 5 additions & 0 deletions packages/lmd/changelog.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
- version: "0.0.1"
changes:
- description: Initial release of the package
type: enhancement
link: https://github.com/elastic/integrations/pull/4833
44 changes: 44 additions & 0 deletions packages/lmd/docs/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
# Lateral Movement Detection Model

The Lateral movement detection model package contains assets that detect lateral movement based on file transfer activity. This package requires a Platinum subscription. Please ensure that you have a Trial, Platinum, or Enterprise subscription before proceeding. This package is licensed under Elastic License v 1.0.

## Configuration

To download the assets, click **Settings** > **Install Lateral Movement Detection assets**.


### Add preconfigured anomaly detection jobs

In **Machine Learning > Anomaly Detection**, when you create a job, you should see an option to `Use preconfigured jobs` with a card for Lateral Movement Detection. When you select the card, you will see a pre-configured anomaly detection job that you can enable depending on what makes the most sense for your environment.

### Enable Security rules

This model uses both anomaly detection and security rules to detect lateral movement in the network. In order to see all alerts detected by this model, you need to enable all the "Security Detection Rules" in the table, as described below. The first four rules are triggered when certain conditions for the anomaly detection jobs are satisfied. The last two rules are behavioral and independent of anomaly detection jobs. See the [documentation](https://www.elastic.co/guide/en/security/current/detection-engine-overview.html) for more information on importing and enabling the rules.

## ML Modules

### Lateral Movement Detection

Detects potential lateral movement activity by identifying malicious file transfers to a host.

| Job | Description |
|---|-------------------------------------------------------------------------------------------------------------|
| high-count-remote-file-transfer | A machine learning job to detect unusually high file transfers to a remote host in the network |
| high-file-size-remote-file-transfer | A machine learning job to detect unusually high size of files shared with a remote host in the network |
| rare-file-extension-remote-transfer | A machine learning job to detect rare file extensions shared with a remote host in the network |
| rare-file-path-remote-transfer | A machine learning job to detect unusual folders and directories on which a file is transferred (by a host) |


## Security Detection Rules

| Rule | Description |
|-----------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| Spike in Remote File Transfers | An anomaly detection job has detected an abnormal volume of remote files shared on the host indicating a potential lateral movement activity. |
| Unusual Remote File Size | An anomaly detection job has detected an unusually high sum of file size shared by a remote host indicating a potential lateral movement activity. |
| Unusual Remote File Directory | An anomaly detection job has detected a remote file transfer on an unusual directory indicating a potential lateral movement activity on the host. |
| Unusual Remote File Extension | An anomaly detection job has detected a remote file transfer with a rare extension indicating a potential lateral movement activity on the host. |
| Malicious Remote File Creation | Identifies the file created by a remote host followed by a malware or intrusion detection event triggered by Elastic Endpoint Security. |
| Remote File Creation on a Sensitive Directory | Identifies the file created by a remote host on sensitive directories and folders. Remote file creation in these directories should not be common and could indicate a malicious binary or script trying to compromise the system. | |

## Licensing
Usage in production requires that you have a license key that permits use of machine learning features.
4 changes: 4 additions & 0 deletions packages/lmd/img/icon-machine-learning.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added packages/lmd/img/sample-screenshot_1.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading