August 16, 2016
Joe Franscella

Putting Your TAXII Server to Work

<p>A <a href="">TAXII server</a> is a client that exchanges standardized and anonymized cyber threat intelligence among users. It works as a venue for sharing and collecting Indicators of compromise, which have been anonymized to protect privacy. It’s not just IoCs, which can be shared via a TAXII server. It is possible to compare intel about malware, too. Any activity in your traffic log that has been established as suspicious can be recorded and shared to benefit others.</p><p>First, the record must be translated into a universal format. This allows users of different proprietary programs to use one another’s intelligence easily. Then it is transmuted through the TAXII server via HTTP based requests and responses known as <em>services</em>.</p><p>Services handle collections of data, which can be shared from or added to your library. Each collection is individually labeled. Data feeds are ordered collections; whereas a data set is an unordered collection. Using these main services, users can <a href="" target="_blank">send and answer queries about threats</a>. The platform can be searched by properties like IP or DNS, time of event, or name.</p><p>The four basic services are:</p><ol><li>Discovery – the primary service to locate relevant offerings</li><li>Data collection management for subscriptions or stand-alone queries</li><li>Inbox – means by which the client pushes information to your server</li><li>Poll – function which requests info from the server</li></ol><p>Servers and clients are defined by their role in the exchange of information, not by their makeup. There are <a href="" target="_blank">many exchange models</a> by which information producers and consumers can use a TAXII server. A threat feed is a one-way channel of intelligence that flows from an intelligence-gathering agency to its users. The configuration will vary depending on whether the host wishes to open the flow up to the public or make it subscriber-only. Threat feeds, which allow for user contributions are a two-way channel. Some organizations decide to share threat feeds in real time, but decide it’s not feasible to log <a href="">80,000 events per second</a> in a database.</p><p>There are many possibilities for uses beyond a two-party exchange. If there is enough information to detect patterns, users can benefit from other forms of data besides stand-alone IoCs. A central body can analyze threats on a bigger scale to discover overarching trends. One example of the hub model is a map showing density of threat actors by IP location. Another use for crowdsourcing data is to identify misinformation. Marking peers as trustworthy helps to isolate users who spread inaccurate data to pollute the pool of threat intelligence.</p><p>All of the examples of ways to use a TAXII server are too many to name. Your actual use scenarios will depend on your needs, your peers, and the amount of threats you encounter. Read more about actual threat intelligence users in our survey, <em>Market Focus: Employing Cyber Threat Intelligence</em>.</p><p><span class="hs-cta-wrapper" id="hs-cta-wrapper-fda943c5-9d10-4128-b771-479fea367310"><span class="hs-cta-node hs-cta-fda943c5-9d10-4128-b771-479fea367310" data-hs-drop="true" id="hs-cta-fda943c5-9d10-4128-b771-479fea367310" style="visibility: visible; display: block; text-align: center;"><a class="cta_button " cta_dest_link="" href="" id="cta_button_458120_841be726-533d-4f0f-86da-0338d3986fb1" style="margin: 20px auto;" target="_blank" title="Get The Survey Here">Get The Survey Here </a> </span> <script charset="utf-8" src=""></script> <script type="text/javascript">hbspt.cta.load(458120, 'fda943c5-9d10-4128-b771-479fea367310', {});</script> </span></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.