Top Qs
Timeline
Chat
Perspective

Indicator of compromise

Artifact observed on a network or in an operating system that indicates a computer intrusion From Wikipedia, the free encyclopedia

Remove ads

An indicator of compromise (IoC) in computer forensics is an artifact observed on a computer network or within an operating system that, with high confidence, indicates a computer intrusion.[1]

Types of indicators

Common IoCs include virus signatures, suspicious IP addresses, MD5 hashes of malware files, and malicious URLs or domain names associated with botnet command and control servers. Once IoCs are identified through incident response or forensic analysis, they can be used for early detection of future attacks with intrusion detection systems and antivirus software.

Automation and sharing

Several standards and initiatives aim to automate IoC processing and sharing:

  • The Incident Object Description Exchange Format (IODEF) standardizes how incident information is described and exchanged.[2]
  • Structured Threat Information Expression (STIX) is used to represent cyber threat information.[3]

Known indicators are often exchanged within the cybersecurity industry, commonly using the Traffic Light Protocol (TLP) to indicate how information may be shared.[4] Other frameworks and standards are also used to support secure information sharing.[5][6][7][8][9][10]

Remove ads

See also

References

Loading related searches...

Wikiwand - on

Seamless Wikipedia browsing. On steroids.

Remove ads