Detection Writing
Defused provides high-fidelity attacker telemetry that you can use to create or refine security detections. Honeypots capture real exploit attempts, enumeration behaviour, and payload structure, making this data ideal for building regex patterns, SIEM rules, and correlation logic in platforms like Splunk, Elastic, Sentinel, or Chronicle.
Workflow
1. Identify a Suspicious Pattern
Start by reviewing high-severity alerts or filtered activity in the Intel Feed. Look for patterns in:
- Request paths
- Query parameters
- Encoded or serialized payloads
- Headers and user-agents
- Traversal or injection indicators
- Vendor-specific routes
These elements often form the basis of a detection.
2. Extract Key Indicators
From the suspicious requests or payloads, extract consistent, repeatable behaviour such as:
- Traversal:
../or%2e%2e - Serialized payload markers:
rO0AB - Vendor-specific paths (e.g., FortiWeb
/remote/fgt_lang) - Template injection markers like
?template= - Uncommon verbs or request sequences
You’ll use these indicators to build your detection logic.
3. Build a Regex or Detection Query
Using the extracted indicators, construct a regex or SIEM query.
Example: Detect traversal attempts (regex)
(\.\./|%2e%2e)
Example: Detect FortiWeb-style suspicious paths (regex)
\/(remote|error|debug)\/[A-Za-z0-9_\-]+
Example: Splunk (SPL) detection for traversal
index=web_logs | regex uri_path="(\.\./|%2e%2e)" | stats count by src_ip, uri_path, user_agent
These can be adapted to any SIEM or log source.
4. Validate Against Defused Telemetry
Export relevant Defused events as CSV and test your detection logic against real attacker data. Use this to:
- Confirm true positives
- Identify false positives
- Tune regex patterns
- Adjust SIEM search logic
Defused’s structured telemetry makes it easy to validate detection quality.
5. Deploy the Detection in Your SIEM
Once validated, deploy the rule in your SIEM of choice. Common destinations include:
- Splunk: SPL correlation searches
- Elastic: KQL/EQL rules
- Microsoft Sentinel: KQL analytics rules
- Chronicle: UDM queries
- Suricata: Custom signatures
These detections can then alert when similar activity appears inside your environment.
Example Use Case: Building a Detection for an Emerging Fortinet Exploit
A user notices unusual, low-frequency requests on Defused FortiWeb decoys:
/remote/fgt_lang?lang=/../../../etc/passwd
They extract the important indicators:
- Endpoint:
/remote/fgt_lang - Parameter:
lang= - Traversal pattern:
/../../../
They create a regex detection:
remote\/fgt_lang.*(\/\.\.\/|\.\./)
Then deploy a Splunk rule using this pattern:
index=firewall_logs | regex uri_path="remote\/fgt_lang.*(\/\.\.\/|\.\./)" | stats count by src_ip, uri_path, user_agent
This results in a production-ready detection written directly from Defused telemetry.