Skip to content

DET0867 Detection of Vulnerability Scanning

Item Value
ID DET0867
Version 1.0
Created 21 October 2025
Last Modified 21 October 2025

Technique Detected: T1595.002 (Vulnerability Scanning)

Analytics

PRE

AN1999

Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). Monitor network data for uncommon data flows. Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious.

Log Sources
Data Component Name Channel
Network Traffic Content (DC0085) Network Traffic None
Network Traffic Flow (DC0078) Network Traffic None
Mutable Elements
Field Description