Recently, I wrote about Detection Engineering and what it entails for a practitioner.
At times, Detection Engineering and Threat Hunting can be blended and talked about interchangeably.
Although there are a lot of similarities, this post will outline some of the differences between the two disciplines. We’ll go over the key differences, strengths, and drawbacks of each.
Detection Engineering
Unlike threat hunting, detection engineering has been around for a long time, for example with Intrusion Detection Systems (IDS). Analysts, engineers, and researchers would allocate a lot of resources to sift through logs, to then come up with detection signatures based off of the network traffic from those logs.
However, Detection engineering concepts have matured and developed with time.
Besides automated detections for static atomic indicators, modern detection engineering incorporates indicators based on threat actors’ behaviors and tools (TTPs). Detection undergoes multiple phases before they finally end in signals of malicious activity, aka rules or alerts. These efforts concentrate on known indicators or behavior and serve a specific purpose, creating signals that will capture malicious activity.
The detection engineering process is also vastly different from threat hunting. Below are some significant tasks that comprise part of that process.
One of the most important and time-consuming tasks in detection engineering is dealing with false positives. An abundance of false positives can become a reality (ask any person in InfoSec 😂), so engineers must walk a fine line between abstract and specific detections.
Another important task is analyzing the current state of detections and tuning existing rules based on their performance. This could mean demoting a rule if it is necessary. In this way, Detection engineering has a more organizational process to it.
Similar to the development process, rules undertake a testing and development period before they make it into production. Whether this goes in CI/CD pipeline is ultimately up to the team, but generally that is where things are headed.
Threat Hunting
While Detection Engineering focuses on identifying and responding to known threats or behaviors, Threat Hunting is a proactive process aimed at uncovering hidden, unknown threats that have bypassed existing security measures.
Threat Hunters actively look for anomalies that could signal a security threat. This is independent of alerts configured. This requires a deep understanding of the organization’s network, systems, and normal user behavior, allowing them to spot deviations that might indicate a security breach.
Threat hunting takes a different approach when it comes to querying and analyzing the data. Since threat hunting aims to identify threats that might have evaded detections, an understanding of how current detections are structured is required. Depending on the initial hypothesis, the focus can be spent on techniques that are not covered by current detections or techniques too difficult to detect due to noise (high false positive rates).
An example can be searching and analyzing the usage of the least commonly used communication protocols during the past month.
Threat hunting queries can have a wider tolerance for noise in the results.
Because of that, multiple data-analysis techniques can assist with zeroing in on the outliers. There is a good article from CyborgSecurity that goes over many other examples in a simplistic manner.
For more on Threat Hunting, see this post that goes over how to approach it in your environment.
Detection Engineering and Threat Hunting: Two Sides of the Same Coin
While Detection Engineering and Threat Hunting are distinct disciplines, they share common ground. Both fields require a deep understanding of the cyber threat landscape, strong analytical skills, and proficiency in various security technologies and tools. There could be different areas of focus, for example NDR (Network Detection & Response), EDR (Endpoint Detection & Response), SIEM (Security information and event management) detection content, and so forth.
In the end, they require a deep understanding of a tool and how to leverage it to prove/disprove a bad thing has happened.
(Bit of an oversimplification, but you get the point)
Both disciplines aim to identify and mitigate security threats, albeit in different ways.
In a nutshell, here are some of the key differences between the practices
- Detection Engineering is typically a more planned and repeatable process, while Threat Hunting is usually more ad hoc and creative.
- Detection Engineering is typically focused on identifying known threats or behaviors, while Threat Hunting is typically focused on identifying unknown threats.
- Detection Engineering relies heavily on automation, using crafted logic to search for and then identify threats. Threat Hunting, by contrast, is a (mainly) manual process, requiring human experience to spot anomalies that the tools might miss.
Here are some of the strengths and drawbacks of each.
Key differences between the two
Eventually, Threat Hunts could end up resulting in Detections themselves.
A post that also talks about this topic in detail is Threat Hunting and Detection Engineering.
And a flow chart from that same post
In the end, both Detection Engineering and Threat Hunting are very important aspects to a company’s Cybersecurity program. It’s not Detection Engineering vs Threat Hunting, but how you can implement the best of both practices.
By understanding the nuances of each, we can better appreciate their unique contributions and how they work together to create a comprehensive defense against threats.
I hope this helps you understand 2 of the domains within the umbrella that is Cybersecurity.
Thanks for reading! Subscribe for free to receive new posts and support my work.