These concepts often work together in security pipelines to transform raw event logs into actionable security intelligence.
Data normalization is the process of standardizing logs and events from different systems into a common format.
Different devices produce logs in inconsistent formats:
Normalization makes them easy to process, query, and correlate.
Raw logs:
src=10.0.1.2 dst=8.8.8.8SourceNetworkAddress=10.0.1.2"sourceIPAddress": "10.0.1.2"After normalization:
source.ip = 10.0.1.2
destination.ip = 8.8.8.8
event.type = connection_attempt
Correlation links together multiple normalized events to identify patterns or attacks that cannot be detected in individual logs.
It can be rule-based or machine-learning-driven.
Brute force + successful login β Account Compromise
Lateral movement correlation:
MITRE ATT&CK correlation:
Mapping event sequences to adversary techniques.
Correlation turns noise into insight by linking events into a storyline, enabling detection of:
Enrichment adds context to events by referencing external intelligence sources or internal metadata.
It transforms raw data into meaningful security intelligence.
| Enrichment Source | Adds Information Like |
|---|---|
| Threat Intelligence Feeds | IP/URL/Hash reputation, malware family |
| GeoIP Databases | Country, ASN, city |
| Asset Inventory | Host criticality, owner, OS |
| Identity Stores (AD/SSO) | User role, privilege level |
| Vulnerability Scanners | CVE exposure of the target system |
| Cloud Metadata | Account ID, region, service type |
A raw event:
source.ip = 45.155.205.10
After enrichment:
source.ip = 45.155.205.10
geo.country = Russia
threat.reputation = malicious
threat.confidence = high
asn = AS35415
ioc_type = known C2 server
Example Scenario
A failed login event from one source and a network connection from another source are normalized.
Enrichment reveals:
Correlation shows:
β‘οΈ High-confidence detection of account compromise.
Copyright © 2026 | WordPress Theme by MH Themes
Be the first to comment