Skip to content

Latest commit

 

History

History
24 lines (12 loc) · 968 Bytes

beacon_detection_via_intra_request_time_deltas.md

File metadata and controls

24 lines (12 loc) · 968 Bytes

Beacon Detection via Intra-Request Time Deltas

Purpose: Find regular HTTP beaconing behavior which may indicate malware C2

Data Required: HTTP proxy logs

Collection Considerations:

Analysis Techniques: Visualization (Bar graphs)

Description

Malware C2 often utilizes regular request intervals ("beacons") to maintain control with the attacker's infrastructure. By examining the intra-request times between requests to the same resource by the same source IP and visualizing the results, you can look for patterns of regular activity.

Other Notes

More Info