IOCs are forensic evidence that indicates a system has already been compromised.
They are artefacts left behind after or during a breach.
Common types include:
They answer the question:
“Did an intrusion occur?”
They are vital for:
IOAs represent adversary actions, behaviors, and patterns, focusing on how the attack is unfolding, not just the artifacts left behind.
They detect the intent and behavior of an attacker—even if no known IOCs are involved.
Behavioral patterns such as:
wmic, certutil, mshta, rundll32They answer:
“Is an intrusion in progress?”
IOAs help detect:
| Feature | IOC | IOA |
|---|---|---|
| Focus | Evidence of compromise | Behavior/intent of attacker |
| Timing | After/during an attack | Before/during an attack |
| Detection | Signature-based | Behavior-based |
| Usefulness | Good for confirming incidents | Good for early detection/prevention |
| Covers Zero-Day Attacks | ❌ Often no | ✅ Yes |
| Stability | May become obsolete quickly | More resilient over time |
A mature security program uses both:
Combo Example:
wmic) running → IOAIOCs = Evidence something bad has happened
IOAs = Evidence something bad is happening or will happen
Using both improves:
Copyright © 2026 | WordPress Theme by MH Themes
Be the first to comment