Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

TTL (Time-to-Live) refers to the amount of time a threat indicator remains within a threat feed. A threat indicator's default time to live can vary based on the type of threat from less than a day to up to a year.  

Note

Default TTLs are assigned a value based on classification and property. The default TTL value is neither dependent on, nor uses Threat Class, Threat Level, Threat Confidence, or other data, when assigning a value. 


Viewing Default TTLs

To view Default TTLs, perform the following:

  1. From the Cloud Services Portal, click Research > Resources.
  2. On the Resources page, click Default TTLs in the top menu. The following information is displayed:
    • Class: The class of a given threat indicator in a threat feed. The Class column can be sorted in ascending or descending order by clicking on its column header. 
    • Property: The property of a given threat indicator in a threat feed. The Property column can be sorted in ascending or descending order by clicking on its column header. 
    • TTL: The Time-to-Live for a given threat indicator in the threat feed. The TTL column can be sorted in ascending or descending order by clicking on its column header. 

The following table displays TTL values for threat indicator classes and properties.  

CLASSPROPERTYTTL
APT
2 years
Bot
7 days
Compromised Host
30 days
Cryptocurrency
1 year
CryptocurrencyCryptocurrency_Coinhive60 days
CryptocurrencyCryptocurrency_Cryptojacking60 days
CryptocurrencyCryptocurrency_Exchange60 days
CryptocurrencyCryptocurrency_Generic14 days
CryptocurrencyCryptocurrency_GenericThreat14 days
CryptocurrencyCryptocurrency_MiningPool60 days
DDoS
12 hours
DNS Tunnel
30 days
DNS TunnelDNSTunnel_Safe1 year
Exploit Kit
30 days
ICS
30 days
Illegal Content
3 days
Internet Infrastructure
1 year
Internet InfrastructureInternetInfrastructure_CompromisedIOT6 months
Internet InfrastructureInternetInfrastructure_UnsecuredIOT6 months
Limited Distro
30 days
Malicious Nameserver
90 days
MalwareC2
120 days
MalwareC2MalwareC2_Gandcrab14 days
MalwareC2MalwareC2_Log4Shell60 days
MalwareC2MalwareC2_Lookalike120 days
MalwareC2DGA
120 days
Malware Download
120 days
Malware Download
MalwareDownload_Gandcrab
14 days
Malware DownloadMalwareDownload_TaurusProject60 days
Parked
120 days
Phishing
120 days
PhishingPhishing_Lookalike120 days
PolicyPolicy_IDNHomograph3 days
Policy
30 days
Policy
1 year
Policy
1 year
Proxy
3 days
ProxyProxy_DNST30 days
Scam
14 days
Scanner
7 days
Sinkhole
1 year
Sinkhole
Sinkhole_IP
75 days
SinkholeSinkhole_Nameserver
14 days
SinkholeSinkhole_SinkholedHost175 days
Spambot
5 days
SuspiciousSuspicious_DGA120 days
SuspiciousSuspicious_Lookalike120 days
SuspiciousSuspicious_Registration120 days
Suspicious
120 days
Uncategorized Threat
120 days
Undefined
1 day
Unwanted Content
120 days
Web App Attack
30 days
Whitelist
1 year





  • No labels