SOAR systems are crucial in automating responses to network security incidents, such as detecting network scans. Here’s how a SOAR system can enrich and process a network scan alert:
- Alert Enrichment: Upon receiving a basic alert from an IDS/IPS system, the SOAR system automatically enriches this information with additional data. This may include:
 
- Historical Log Analysis: Examining past logs and events associated with the IP or similar attack patterns to gain historical context.
 - Reputation Database Checks: Checking the perpetrator’s IP address in public and private IP reputation databases to determine if it is known from previous attacks or suspicious activities.
 - Geolocation Correlation: Associating the IP address with geolocation to understand the geographic context of the attack source.
 
- Threat Classification and Assessment: Based on the enriched data, the SOAR system analyzes the risk associated with the detected scan:
 
- Connection Attempt Frequency: Assessing how frequently the suspicious IP tried to establish a connection, which can indicate an automated attack.
 - Targeted Services: Identifying which services or ports were targeted by the attack, which can suggest motives and potential objectives of the attacker.
 
- Response Decisions: Depending on the established risk level, the system can automatically take a series of actions to minimize potential damage, such as:
 
- Network Firewall Rule Application: Implementing firewall rules that restrict access to key network resources for the identified IP address.
 - Security Team Notifications: Informing the security team through automated email or SMS notifications.
 - Ongoing Monitoring: For lower-level threats, the SOAR can continue to monitor the IP activity and collect more data before deciding on an intervention.