1. NIST Special Publication 800-61 Rev. 2
Computer Security Incident Handling Guide. Section 3.2.2
"Signs of an Incident
" lists common indicators. Indicator #5 states
"Unusual outbound network traffic... Large amounts of outbound traffic from a particular host may indicate that sensitive data is being exfiltrated." (Page 24).
2. Purdue University
CERIAS (The Center for Education and Research in Information Assurance and Security). In technical reports on intrusion detection
such as "A Survey of Anomaly Detection Techniques in Network Intrusion Detection
" it is established that significant deviations from baseline network behavior
such as unusually large outbound data flows to new or suspicious IP addresses
are primary indicators of compromise and potential data exfiltration. (e.g.
Garcia-Teodoro
P.
et al.
2009. Anomaly-based network intrusion detection: Techniques
systems and challenges. Computers & Security
28(1-2)
pp.18-28. https://doi.org/10.1016/j.cose.2008.08.003).
3. MIT OpenCourseWare
6.858 Computer Systems Security
Fall 2014. Lecture notes on Network Security discuss traffic analysis as a method for detecting compromises. Monitoring for anomalous traffic patterns
including large
unexpected outbound connections
is a fundamental technique for identifying systems that have been compromised for purposes such as data exfiltration. (See Lecture 15: Network Security).