IMPORTANT: No additional bug fixes or documentation updates
will be released for this version. For the latest information, see the
current release documentation.
Unusual Linux Network Port Activityedit
Identifies unusual destination port activity that can indicate command-and- control, persistence mechanism, or data exfiltration activity. Rarely used destination port activity is generally unusual in Linux fleets, and can indicate unauthorized access or threat actor activity.
Rule type: machine_learning
Machine learning job: linux_anomalous_network_port_activity_ecs
Machine learning anomaly threshold: 50
Severity: low
Risk score: 21
Runs every: 15 minutes
Searches indices from: now-45m (Date Math format, see also Additional look-back time
)
Maximum signals per execution: 100
References:
Tags:
- Elastic
- Linux
- ML
Version: 1
Added (Elastic Stack release): 7.7.0
Potential false positivesedit
A newly installed program or one that rarely uses the network could trigger this signal.