Esc
Network Traffic Filtering
Definition
Restricting network traffic originating from any location.
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Technique Subclasses
There are 4 techniques in this category, Network Traffic Filtering.
| Name | ID | Definition | Synonyms |
|---|---|---|---|
| Network Traffic Filtering | D3-NTF | Restricting network traffic originating from any location. | |
| - Inbound Traffic Filtering | D3-ITF | Restricting network traffic originating from untrusted networks destined towards a private host or enclave. | |
| - Email Filtering | D3-EF | Filtering incoming email traffic based on specific criteria. | |
| - Outbound Traffic Filtering | D3-OTF | Restricting network traffic originating from a private host or enclave destined towards untrusted networks. |
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, , , and .
Lateral Movement
Remote Services
Use Alternate Authentication Material
Exploitation of Remote Services
Internal Spearphishing
Remote Service Session Hijacking
Lateral Tool Transfer
Privilege Escalation
Account Manipulation
Event Triggered Execution
Command And Control
Remote Access Tools
Encrypted Channel
Proxy
Data Obfuscation
Multi-Stage Channels
Fallback Channels
Data Encoding
Application Layer Protocol
Dynamic Resolution
Traffic Signaling
Web Service
Non-Application Layer Protocol
Ingress Tool Transfer
Protocol Tunneling
Non-Standard Port
Impact
Network Denial of Service
Endpoint Denial of Service
Data Manipulation
Collection
Adversary-in-the-Middle
Browser Session Hijacking
Email Collection
Discovery
Remote System Discovery
Persistence
Account Manipulation
Pre-OS Boot
BITS Jobs
Traffic Signaling
Event Triggered Execution
Initial Access
Phishing
Exploit Public-Facing Application
Trusted Relationship
Drive-by Compromise
Credential Access
Adversary-in-the-Middle
Brute Force
OS Credential Dumping
Steal or Forge Kerberos Tickets
Defense Evasion
Use Alternate Authentication Material
Pre-OS Boot
Rogue Domain Controller
BITS Jobs
Traffic Signaling
System Binary Proxy Execution
Exfiltration
Exfiltration Over Web Service
Automated Exfiltration
Exfiltration Over Alternative Protocol
Data Transfer Size Limits
Scheduled Transfer
Exfiltration Over C2 Channel
Exfiltration Over Other Network Medium
References
All
Patent
Internet Article
The following references were used to develop the Network Traffic Filtering knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Active firewall system and methodology
Reference Type: Patent Organization: McAfee LLC Author: Emilio Villa, Adrian Zidaritz, Michael David Varga, Gerhard Eschelbeck, Michael Kevin Jones, Mark James McArdle
Automatically generating rules for connection security
Reference Type: Patent Organization: Microsoft Author: Charles D. Bassett; Eran Yariv; Ian M. Carbaugh; Lokesh Srinivas Koppolu; Maksim Noy; Sarah A. Wahlert; Pradeep Bahl
FWTK - Firewall Toolkit
Reference Type: Internet Article
Firewall for interent access
Reference Type: Patent Organization: Secure Computing LLC Author: Edward B Stockwell, Alan E Klietz
Firewall for processing a connectionless network packet
Reference Type: Patent Organization: National Security Agency Author: Patrick W. Dowd, John T. McHenry
Firewall for processing connection-oriented and connectionless datagrams over a connection-oriented network
Reference Type: Patent Organization: National Security Agency Author: Patrick W. Dowd, John T. McHenry
Firewalls that filter based upon protocol commands
Reference Type: Patent Organization: Intel Corp Author: James E. Toga
Method for controlling computer network security
Reference Type: Patent Organization: Checkpoint Software Technologies Ltd Author: Gil Shwed
Network firewall with proxy
Reference Type: Patent Organization: Secure Computing LLC Author: Michael W Green, Ricky Ronald Kruse