Network-based IoCs are derived from traffic patterns and communication behaviors across the network. These indicators often reveal command-and-control (C2) communication, malware delivery attempts, or data exfiltration activities.
Unusual outbound traffic to unfamiliar IP addresses or abnormal DNS requests can indicate that a compromised system is communicating with an attacker-controlled infrastructure.
Examples of network IoCs
Operational value: Network IoCs are especially useful for identifying lateral movement and detecting compromised systems attempting to communicate externally.
Host-based IoCs are artifacts discovered directly on endpoints or servers during forensic analysis. They provide evidence of malicious activity at the system level and are often critical for understanding persistence mechanisms.
These indicators can include altered files, registry modifications, or suspicious processes running in memory.
Examples of host-based IoCs
Operational value: Host-based indicators help analysts confirm compromise, track attacker persistence, and support forensic investigations.
Email remains one of the most common initial attack vectors due to its accessibility and effectiveness in social engineering campaigns. Email IoCs help detect phishing attempts, malware delivery, and credential harvesting attacks.
Attackers often disguise malicious content within legitimate-looking messages to trick users into executing payloads or revealing sensitive information.
Examples of email IoCs
Operational value: Email IoCs enable security teams to identify phishing campaigns early and block malicious communications before users are impacted.
Behavioral IoCs focus on abnormal activities exhibited by users, applications, or systems. Instead of static artifacts, these indicators highlight suspicious patterns that deviate from normal operational behavior.
Behavioral analysis is increasingly important in detecting advanced threats that evade signature-based detection.
Examples of behavioral IoCs
Operational value: Behavioral indicators are highly effective in detecting advanced persistent threats (APTs), insider threats, and fileless malware attacks.
Security tools such as SIEM, IDS/IPS, and EDR solutions leverage IoCs to trigger alerts and identify anomalies.
Analysts proactively search for IoCs within logs and telemetry data to uncover hidden threats.
IoCs provide evidence that helps reconstruct attack timelines and determine root causes.
Sharing IoCs across organizations enhances collective defense and enables faster identification of emerging threats.