Home

How Azure Security Center detects DDoS attack using cyber threat intelligence

%3CLINGO-SUB%20id%3D%22lingo-sub-85391%22%20slang%3D%22en-US%22%3EHow%20Azure%20Security%20Center%20detects%20DDoS%20attack%20using%20cyber%20threat%20intelligence%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-85391%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20Security%20Center%20automatically%20collects%2C%20analyzes%2C%20and%20integrates%20log%20data%20from%20a%20variety%20of%20Azure%20resources.%20A%20list%20of%20prioritized%20security%20alerts%20are%20shown%20in%20Security%20Center%20along%20with%20the%20information%20you%20need%20to%20quickly%20investigate%20the%20problem%20along%20with%20recommendations%20for%20how%20to%20remediate%20an%20attack.%20In%20addition%2C%20a%20team%20of%20security%20researchers%20and%20experts%20often%20work%20directly%20with%20customers%20to%20gain%20insight%20into%20security%20incidents%20affecting%20Microsoft%20Azure%20customers%2C%20with%20the%20goal%20of%20constantly%20improving%20Security%20Center%20detection%20and%20alerting%20capabilities.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20the%20previous%20blog%20post%20%22%3CA%20title%3D%22%22%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fazure-security-center-adds-context-alerts-to-aid-threat-investigation%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Security%20Center%20adds%20Context%20Alerts%20to%20aid%20threat%20investigation%3C%2FA%3E%2C%22%20Ian%20Hellen%20described%20the%20context%20alerting%20feature%20that%20helps%20to%20automate%20security%20investigation%20and%20delivers%20relevant%20context%20about%20what%20else%20happened%20on%20the%20system%20during%20and%20immediately%20before%20an%20attack.%20In%20this%20blog%20post%2C%20we%20will%20focus%20on%20a%20real-world%20DDoS%20attack%20campaign%20and%20how%20it%20was%20detected%20using%20cyber%20threat%20intelligence.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20764px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F16904i93F3099B6A67A81F%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22azure-security-center1.png%22%20title%3D%22azure-security-center1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERead%20about%20it%20on%20the%20Azure%20blog.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-85391%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESecurity%20Center%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Community Manager

Azure Security Center automatically collects, analyzes, and integrates log data from a variety of Azure resources. A list of prioritized security alerts are shown in Security Center along with the information you need to quickly investigate the problem along with recommendations for how to remediate an attack. In addition, a team of security researchers and experts often work directly with customers to gain insight into security incidents affecting Microsoft Azure customers, with the goal of constantly improving Security Center detection and alerting capabilities.

 

In the previous blog post "Azure Security Center adds Context Alerts to aid threat investigation," Ian Hellen described the context alerting feature that helps to automate security investigation and delivers relevant context about what else happened on the system during and immediately before an attack. In this blog post, we will focus on a real-world DDoS attack campaign and how it was detected using cyber threat intelligence.

 

azure-security-center1.png

 

Read about it on the Azure blog.