Five Tips to Reduce Dwell Time

Dwell time is arguably the most accurate indicator of an enterprise’s security.

Hooded figure at laptop surrounded by binary code, symbolizing hidden cyber attacker and long dwell time security risks
Key Takeaways
  • Dwell time is a more accurate measure of an enterprise’s security effectiveness than counts of breached systems, because it directly reflects how quickly intrusions are detected and remediated.
  • Attackers increasingly rely on stealthy, low-signal techniques that blend with normal traffic, including DNS exfiltration and covert use of common protocols and social media for command-and-control.
  • Overly sensitive detection schemes generate excessive false positives, while overly insensitive schemes miss true compromises, so tuning for an optimal signal-to-noise balance is essential.
  • Enterprises must monitor both internal and external network traffic to establish a baseline of normal behavior and flag anomalous deviations for deeper investigation.
  • Consistent application of security fundamentals—system hardening, risk analysis, and prioritized patching of critical vulnerabilities—remains key to reducing attacker dwell time.
  • Organizations should operate under an assumption of breach and allocate sufficient resources to detection and response capabilities, not just traditional perimeter and signature-based prevention tools.

Dwell time is arguably the most accurate indicator of an enterprise’s security. It can determine how good you are in finding and eliminating actual breaches. Some indicators are less reliable. For example, the number of breached systems might either indicate your systems are well protected or, it might mean there are gaps in your ability to identify intrusions. On the other hand, dwell time is critical for an attacker to reach its goal, because an attack must go through all the steps of a “Kill Chain”, which requires time. Dwell time typically ranges between 200 to 250 days.[i

Stealth is the number one tool in an attacker’s arsenal – a breached system should look and behave as normal as possible to avoid detection. To keep their activities under the radar, cyber attackers use common protocols and services to communicate with Command and Control centers, to avoid attracting attention of common detection methods. Using covert channels such as DNS exfiltration and posting innocuous looking messages or images to social media to be picked up by the attacker later are becoming increasingly common for avoiding detection.

Attackers have done a great job authoring malware that is very “low signal” in an effort to stay hidden. Enterprises on the other hand end up sorting through all the noise of the various security technologies they have in place to find that signal.  This is basic physics – if you design your detection scheme to be too sensitive to the signal it will get overwhelmed by the noise, giving nothing but endless false-positives that erode the confidence in the scheme itself.  On the flip side, if you design your detection scheme to be too insensitive, you will never find the signal that indicates the compromise.

Below are five basic tips to reduce dwell time.

  1. Enterprises should co-evolve with the attackers and understand that traditional firewalls or signature-based detection methods will do little to protect against the new generation of threats.
  2. As attackers are opting for indirect methods of communication through legitimate services, enterprises should focus their efforts on understanding their “normal” by closely monitoring internal and external traffic on their network. Most enterprises just capture external traffic through web proxies but have no visibility into the internal network.
  3. Once the baseline is established, any deviation from expected behavior should be scrutinized further to look for signs of suspicious activity.
  4. Traditional security best practices such as hardening all systems, performing risk management analysis and prioritizing the patching of critical and vulnerable systems consistently still goes a long way in shortening dwell time.
  5. Enterprises should assume that they will be breached and prepare for it, which means that sufficient resources should be allocated into detection and mitigation as opposed to just focusing on prevention. A recent survey of over 300 enterprises conducted by UBM revealed that:
    • 93% of organizations use anti-virus and anti-malware tools
    • 82% use perimeter firewalls
    • 65% use intrusion preventions systems
    • 52% use unified threat management systems

Published in:


An avatar of the author

BlueCat provides core services and solutions that help our customers and their teams deliver change-ready networks. With BlueCat, organizations can build reliable, secure, and agile mission-critical networks that can support transformation initiatives such as cloud adoption and automation. BlueCat’s growing portfolio includes services and solutions for automated and unified DDI management, network security, multicloud management, and network observability and health.

Related content

Three armored figures walking toward a futuristic Las Vegas skyline with pyramids, glowing orb, and "Welcome to Fabulous Las

Your journey to intelligent NetOps begins at Cisco Live

Visit BlueCat’s booth or book a meeting now to learn more about how our solutions can help you build a network that supports constant change.

Read more
Stacked colorful wooden directional arrows on a post by a calm seaside with distant hills and blue sky

Replace BIND and ISC with Micetro DNS/DHCP Server (MDDS)

Tired of patching and manually configuring BIND DNS and ISC DHCP? Discover how Micetro MDDS appliances can replace them for modern DDI.

Read more
Row of orange industrial robotic arms positioned along an automated conveyor belt in a factory setting

Automate it all in Integrity with REST v2 API-first DDI management

Discover API-first DDI with Integrity X by using REST v2 to automate DNS, DHCP, and IPAM for scalable, secure network operations.

Read more
Three colleagues at monitors collaborating, overlaid with network, analytics, cloud, and gear icons.

Agentic AI adoption in network observability propels NetOps teams

Network observability is crucial for today’s networks and even more capable with agentic AI, according to new Omdia and BlueCat research.

Read more

⏳ Cisco Live is almost here. Put BlueCat on your agenda for smarter, more secure networks.