Application Protocol Command Analysis
Definition
Analyzing application protocol level remote commands to detect unauthorized activity.
How it works
This technique requires the ability to parse application layer protocols to understand the commands being sent to a remote service. Signature-based or statistical analysis may be employed to identify unauthorized commands being sent. These commands can be observed by monitoring network traffic or application logs.
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Technique Subclasses
There are 2 techniques in this category, Application Protocol Command Analysis.
| Name | ID | Definition | Synonyms |
|---|---|---|---|
| Application Protocol Command Analysis | D3-APCA | Analyzing application protocol level remote commands to detect unauthorized activity. | |
| - Remote Firmware Update Monitoring | D3-RFUM | Monitoring of remote firmware update commands to identify unauthorized software installations. |
Related ATT&CK Techniques:
These offensive techniques are determined related because of the way this defensive technique,, , and .
References
The following references were used to develop the Application Protocol Command Analysis knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)