Skip to content

Introduction of Correlation

Introduction to Correlation

A correlation rule serves as an intelligent template that defines specific conditions and relationships between different events, enabling the detection of complex threats that might not be apparent when examining individual logs in isolation.

This service allows the user to correlate events based on data correlation rules that accommodate different needs, like as: brute force attack prevention, abnormal user behaviour, virus attacks (and/or propagation), application misbehaviour, etc.

How Correlation rules work

Correlation rules are advanced logic-based rules used to analyze and link related security events within the system: * Combine Multiple Events: Analyze data from diverse sources such as firewalls, intrusion detection systems, authentication logs, and application logs * Define Temporal Relationships: Define timeframes in which related events must occur to trigger an alert * Establish Event Sequencing: Specify the order in which events should happen to identify attack patterns * Apply Conditional Logic: Apply specific conditions to differentiate between normal behavior and potential threats

For more detailed information about correlation and its implementation in CYBERQUEST, please refer to the following resources:

Alerts Module

Data flow rules and filters

How to create new alerts

How to create a DTS Alert