Rule-based correlation uses traditional correlation logic to analyze information collected in real time. This correlation takes all logs, events, and network flows that are correlated together along with contextual information such as identity, roles, vulnerabilities, and more—to detect patterns indicative of a larger threat. There are mainly two types of rules: network topology based rules and service model based rules.
For the network topology based rules, firstly, we must build an inventory of all network devices and subcomponents. Secondly, we must draw edges between each component connected to the network or to some layer of the OSI protocol stack. Once those edges are defined, we can build the rules to group events if their originating devices, for instance, are within 2 hops of each other.
Rules specific to particular types of devices and parts of the network have to be developed and managed over time (Fournier-Viger et al., 2021). Certainly, there are pros and cons to using this rule. Unfortunately for us, the cons of this particular rule outweigh the pros.
Pros:
Cons:
On the other hand, service model based rules require that services are defined in a way that event metadata can be associated with a particular service. This metadata may be node information or other logical components of the service. Similar to a network topology, the service models must map common edges across these logical components. And similarly to topology based rules, the cons for this rule also outweigh the pros.
Pros:
Cons:
In general, rules based correlation can provide only limited compression of the event stream, but with sufficient development time, can provide for moderately accurate correlation.