Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 315

Diamond Model of Intrusion Analysis

What is Diamond Model of Intrusion Analysis?

Diamond Model of Intrusion AnalysisAn intrusion analysis framework that ties every malicious event to four linked vertices: adversary, capability, infrastructure, and victim.


The Diamond Model of Intrusion Analysis, introduced by Caltagirone, Pendergast, and Betz in 2013, represents each malicious event as a diamond connecting four core features: Adversary, Capability (tooling, malware, TTPs), Infrastructure (IPs, domains, C2), and Victim. Meta-features such as timestamp, phase, result, direction, methodology, and resources enrich each event. Analysts pivot across vertices to enumerate related activity — for example, from a domain to other domains the same adversary registered, or from a capability hash to other victims it has touched. The model complements MITRE ATT&CK and the Cyber Kill Chain by making relationships explicit, and is widely used in threat intelligence platforms, intrusion-analysis reports, and structured pivoting workflows.

Examples

  1. 01

    Pivoting from a malware sample (capability) to a registered domain (infrastructure) to map a wider campaign.

  2. 02

    Linking multiple incidents to the same Adversary cluster based on shared TTPs and victimology.

Frequently asked questions

What is Diamond Model of Intrusion Analysis?

An intrusion analysis framework that ties every malicious event to four linked vertices: adversary, capability, infrastructure, and victim. It belongs to the Defense & Operations category of cybersecurity.

What does Diamond Model of Intrusion Analysis mean?

An intrusion analysis framework that ties every malicious event to four linked vertices: adversary, capability, infrastructure, and victim.

How does Diamond Model of Intrusion Analysis work?

The Diamond Model of Intrusion Analysis, introduced by Caltagirone, Pendergast, and Betz in 2013, represents each malicious event as a diamond connecting four core features: Adversary, Capability (tooling, malware, TTPs), Infrastructure (IPs, domains, C2), and Victim. Meta-features such as timestamp, phase, result, direction, methodology, and resources enrich each event. Analysts pivot across vertices to enumerate related activity — for example, from a domain to other domains the same adversary registered, or from a capability hash to other victims it has touched. The model complements MITRE ATT&CK and the Cyber Kill Chain by making relationships explicit, and is widely used in threat intelligence platforms, intrusion-analysis reports, and structured pivoting workflows.

How do you defend against Diamond Model of Intrusion Analysis?

Defences for Diamond Model of Intrusion Analysis typically combine technical controls and operational practices, as detailed in the full definition above.

Related terms

See also