IncidentResponsev2

4.09.3 Evaluate Network Baseline (Upgraded)

Task

Evaluate and establish a baseline of normal network activity and detect deviations that may indicate malicious behaviors such as lateral movement, beaconing, exfiltration, or command and control (C2) activity.


Conditions

Given access to Security Onion, Zeek logs, Suricata alerts, full packet capture (PCAP), and knowledge of the environment’s expected network layout and mission roles.


Standards


End State

A network baseline is documented and deviations from normal behavior are identified and tagged for escalation or eradication actions.


Notes


Manual Steps

Step 1: Review Available Network Telemetry

Confirm which telemetry sources are active on Security Onion:

sudo so-status

Operator Note: If Zeek is down, restart sensors before proceeding. Zeek is critical for establishing the baseline.


Step 2: Capture and Identify “Normal” Network Behavior

Focus Areas

Area What to Baseline Why
Internal to Internal AD, DNS, SMB, RDP, File Shares Identify lateral movement pathways
Internal to External Web, Email, VPN Identify normal business flows
Inbound VPN, Reverse Proxies Ensure only expected services are exposed
Outbound to Unusual Destinations Rare external IPs/Domains Potential C2 or data exfiltration

Example Kibana Queries:

event.dataset:zeek.conn AND network.direction:"outbound"
event.dataset:zeek.dns
event.dataset:zeek.ssl

Operator Note: Record observed legitimate hosts and expected domains (office365.com, google.com, internal NTP servers).


Step 3: Identify and Document Normal Services and Ports

Using Zeek conn logs:

zcat /nsm/zeek/logs/current/conn.log.gz | zeek-cut id.orig_h id.resp_h id.resp_p service

Example results:

192.168.1.10 192.168.1.1 53 dns
192.168.1.10 192.168.1.5 445 smb
192.168.1.10 8.8.8.8 443 ssl

Document in table format:

Source IP Dest IP Port Service Notes
192.168.1.10 192.168.1.5 445 SMB Normal domain traffic
192.168.1.10 8.8.8.8 443 SSL Expected web traffic

Step 4: Identify Abnormal Patterns and IOC Signals

IOC and Suspicious Signals to Search For

Indicator Type How to Find Example IOC
Beaconing Behavior Zeek conn logs → periodic, regular intervals conn.log → Check duration/intervals
External Connections to Rare IPs Zeek conn logs + threat feeds IP addresses → known malicious IPs
DNS Tunneling Zeek dns.log → very long query names suspicious.domain.exfil.data.com
Non-standard Ports Zeek conn.log → high or unexpected ports RDP (3389) → from internal clients
SMB/LDAP Lateral Movement Zeek smb.log or conn.log → host-to-host SMB traffic Multiple internal hosts communicating unexpectedly
Cleartext Credentials Zeek http.log, Suricata alerts HTTP login forms over port 80
Unusual User-Agent Strings Zeek http.log Custom User-Agent indicating tool-based C2

Operator Note: Use correlation and time-series views in Kibana to look for repeat patterns or relationships between hosts.


Step 5: Validate with Network Owners and Documentation

Operator Note: Always ask → many false positives can be ruled out by simple questions to owners.


Dependencies


Other Available Tools

Tool Platform Installation Usage
Zeek Built-in (Security Onion) Native Network metadata analysis
Wireshark Cross-platform Package manager PCAP analysis
ELK / Kibana Built-in (Security Onion) Native Search and visualization
Threat Intelligence Feeds External N/A IOC correlation

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 2.0 Fully expanded version with IOCs, examples, and deep operator context Leo