In security parlance, the detection outputs of both unsupervised and supervised models are referred to as spot detections. Spot detections provide information around a single unit of analysis, such as a specific authentication action or executable. Spot detections are useful for making predictions, but they don’t tell the whole story. Detection correlations, on the other hand, allow security experts to combine multiple spot detections to form the complete picture of an attack across an enterprise.
Consider this example: if you’re just analyzing an individual firewall rule, you might think a certain activity was blocked for benign reasons. But with correlation analysis, you can see there was a sequence of related activities that started with an anomalous authentication, followed by the transfer of a file to a remote machine and then the execution of a malicious file. Here, the ability to detect a correlation exposes malicious activity you may have otherwise missed.
Collective Defense is a collaborative approach to cybersecurity that extends correlation detection beyond the enterprise. Organizations that participate in a collective defense system can see attack trends or sequences of events across their industry, enabling a more proactive defense. By analyzing common techniques based on real-world observations, as mapped within the
MITRE ATT&CKⓇ Framework, you can start to assess where you need to shore up your defenses.