Critical Infrastructure Cybersecurity Framework
T1095C22 Mitigations

Non-Application Layer Protocol

Adversaries may use an OSI non-application layer protocol for communication between host and C2 server or among infected hosts.

Description

Adversaries may use an OSI non-application layer protocol for communication between host and C2 server or among infected hosts.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Filter Network TrafficNetwork Intrusion Prevention

Quick Info

Technique ID
T1095
Tactic
C2
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.