SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
S O L U T I O N S G U I D E
Splunk® for Cyber Threat Analysis
A Big Data Approach to Enterprise Security
Challenge of Discovering Known and Unknown
Threats
In today’s cyber battlefield a vast amount of information is
commonly processed, aggregated and correlated to identify
security incidents collected from the IT architecture. This effort
largely represents looking for known threats—looking for
incidents that have been pre-defined as security threats. The
cyber analyst sets up behavioral rules that identify and match a
level of response that is appropriate for a given security incident.
These rules are commonly present in the detection technology
itself or may be implemented via a security information and
event management (SIEM) technology.
From an enterprise security point of view, this methodology of
aggregation and correlation is often targeted at the tier-1 data
center level, which operates as the front-line defense of your IT
security. The combination of human assets and technology falls
under the broad term of CND (or computer network defense)
and has represented the baseline for all SecOPS over the years.
While current technologies and methods are still somewhat
effective in identifying breeches, attackers have changed their
methodologies and have made the “what you know” proposition
much more difficult to quantify. Compounding the issue is
the explosion of unstructured data from increasingly complex
technologies that often do not fit nicely into the structured world
of SIEM, which can impose artificial restrictions on the collection
of specific data types and provide little visibility into attack
patterns and context.
In response to more sophisticated attacks, a new kind of cyber
threat analyst has emerged operating at the tier-3 level. This
analyst functions as a “security intelligence analyst” and is
often called upon to perform detailed analysis upon a security
incident. Rather than the point-in-time / predetermined
analysis of the tier-1 analyst, the intelligence analyst must
consider threats against a much larger pool of information,
some machine generated and some human generated, over a
significantly longer period of time. The unfortunate truth is that
the pre-defined tools of the tier-1 analyst, which are designed to
reduce the amount of data for analysis, are not suitable for the
investigative needs of the security intelligence analyst.
A Big Data Approach to Discovering Unknown
Threats
While Splunk can certainly address the tier-1 needs of reduction
and correlation, Splunk was designed to support a new paradigm
of data discovery. This shift rejects a data reduction strategy
in favor of a data inclusion strategy. This supports analysis of
very large datasets through data indexing and MapReduce
functionality pioneered by Google. This gives Splunk the ability
to collect data from virtually any available data source without
normalization at collection time and analyze security incidents
using analytics and statistical analysis.
Other Splunk functionality often leveraged for
threat analysis includes:
Indexed data storage with automated field extraction.
Splunk does not store data in a traditional schema-based
row and column format: events are free to be interpreted
as they are. This is especially important where the event
presents ‘multi-value’ fields such as an event that can
write multiple values for the same field in the same event.
This is a common issue in data sources that track SMTP
addresses. The addresses the data sources contain are
often variable. Using Splunk, each of these would be
extracted out separately regardless of the actual event.
Statistical analysis command language. Splunk offers
a ‘search language’ rather than an SQL-style query
language. While an SQL language is adequate for
searching what you know (such as values in columns that
are indexed) it is not adequate for handling ad-hoc queries
since it is a very structured language designed to blindly
‘dump’ the contents of a cell. In contrast, the Splunk search
language offers a much greater freedom in formulating
questions on the fly with a search-friendly interface that is
focused more on acquiring answers rather than formatting
questions. Additionally, much of the search language
is designed to manipulate the data not just save it. For
instance, the Splunk stats command can process a field
any number of ways such as averaging, first value, list,
max, mean, mode, percentile, per-hour, range, standard
deviation, sum and variance—just to name a few. The
ability to ask nearly any conceivable question of the data
rather than simply dumping the data is a key capability for
threat analysis.
Add knowledge to make Splunk smarter. The Splunk
function of tagging, when combined with the ability to
scale to incredibly large datasets allows threat analysts
to classify data independent of its source. This can
be as simple as classifying a particular IP address as
‘hostile,’ which then gets turned into an IP-hostile report
or classified by IP address report that can be analyzed
separately. Since tagging is performed at search time
rather than at index time, you can view data by different
www.splunk.com
S O L U T I O N S G U I D E
250 Brannan St, San Francisco, CA, 94107 info@splunk.com | sales@splunk.com 866-438-7758 | 415-848-8400 www.splunkbase.com
Copyright © 2012 Splunk Inc. All rights reserved. Splunk Enterprise is protected by U.S. and international copyright and intellectual property laws.
Splunk is a registered trademark or trademark of Splunk Inc. in the United States and/or other jurisdictions. All other marks and names mentioned
herein may be trademarks of their respective companies. Item # SG-Splunk-Security-106
time slices–this is especially important for handling “watch
lists.” While these lists might change on a daily basis, the
relevant data collected against them can extend back
months. Splunk can also ‘learn’ IP address changes for
malicious websites through correlation of DNS and Netflow
data.
Add data for event context. Lookup tables provide
another invaluable function to the threat analyst. Lookup
tables allow repository data to be merged with event
data. For example, a repository of human resources data
such as name, phone number and physical location can
form the lookup based on the MAC address of a computer.
Since lookups can also be temporal in nature, an IDS
event can be used to look up DHCP data to acquire the
MAC address--which can then be used to lookup the HR
data. Thus, every IDS event from an internal node can be
associated temporally with a name, contact and location.
Splunk can dynamically create these tables based on event
data and monitor them for any length of time. Data access
procedures and processes can be monitored and given
context without the manual effort involved with piecing
together all the data that must be collected. In today’s
environment, users are often assigned multiple devices.
Using the above method and lookups to Active Directory
or an HR database, a threat analysts would be able to
ask the data to “Show all devices for ‘Bill’ across the IT
architecture and determine process violations.”
Accelerate forensic analysis across data types.
Associated with lookup tables, workflows actions allow
interactions between fields and other web sources. For
instance, a workflow might be created to perform a WHOIS
on an IP address or perhaps a click-on-demand function
to request “port details” from the Internet Storm Center.
Acquisition of third-party information in a timely fashion is
another key to the success of the threat analyst.
Collect data when you want without altering its format.
Depending on vendor support for specific data types is
the number one complaint of many security practitioners.
Splunk is data agnostic. No normalization is required for
Splunk to gather data. As long as the data is ASCII or is
UTF-8 compliant, Splunk will consume data much like a
human consumes data -- if it’s readable, it’s consumable.
While this is very handy for bringing in any dataset that
might be present during an investigation with a minimum
of work, for the threat analyst, it represents an ability
to think outside the box—by bringing all the data in the
enterprise architecture to bear in a specific problem. COTS
products often miss threats that only present themselves
as abnormal patterns in normal IT data. Sometimes it
takes ingenuity, creativity and out-of-the-box thinking
when dealing with threats that can hide behind normal
credentialed user activities. Splunk is the technology that
facilitates such thinking.
S O L U T I O N S G U I D E
Successful security intelligence analysts must be agile and adept
at thinking “outside of the box.” Additionally, they must be
capable of considering a wide range of data that often changes
during the course of the investigation. Splunk is a platform
designed to facilitate these requirements and provide the threat
analyst the ability to use any and all IT data to accomplish their
mission objectives such as:
Perform research on adversarial threats posed to
various systems, technologies, operations or missions in
appropriate intelligence sources
Analyze collected data to derive facts, inferences and
projections concerning capabilities, intentions, attack
approaches, and likelihood of various adversarial attacks
under various situations
Use context to more accurately determine false-positives
and false-negatives.
Research resource allocations, motivations, tendencies,
personalities and tolerance for detection, attribution and
retribution that influence adversarial decisions
Contribute to profiling adversarial behavior with respect to
identified system attacks in an operational mission context
Produce formal and informal reports, briefings, and
perspectives of the behavior of adversaries against target
systems, technologies, operations and missions
Free Download
Download Splunk for free. You’ll get a Splunk Enterprise license
for 60 days and you can index up to 500 megabytes of data per
day. You can convert to a perpetual Free license or purchase an
Enterprise license by contacting sales@splunk.com.

Más contenido relacionado

La actualidad más candente

Splunk Discovery: Warsaw 2018 - Getting Data In
Splunk Discovery: Warsaw 2018 - Getting Data InSplunk Discovery: Warsaw 2018 - Getting Data In
Splunk Discovery: Warsaw 2018 - Getting Data InSplunk
 
Performing Network & Security Analytics with Hadoop
Performing Network & Security Analytics with HadoopPerforming Network & Security Analytics with Hadoop
Performing Network & Security Analytics with HadoopDataWorks Summit
 
Just the sketch: advanced streaming analytics in Apache Metron
Just the sketch: advanced streaming analytics in Apache MetronJust the sketch: advanced streaming analytics in Apache Metron
Just the sketch: advanced streaming analytics in Apache MetronDataWorks Summit
 
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...IJNSA Journal
 
Deep Learning in Security—An Empirical Example in User and Entity Behavior An...
Deep Learning in Security—An Empirical Example in User and Entity Behavior An...Deep Learning in Security—An Empirical Example in User and Entity Behavior An...
Deep Learning in Security—An Empirical Example in User and Entity Behavior An...Databricks
 
A Query Model for Ad Hoc Queries using a Scanning Architecture
A Query Model for Ad Hoc Queries using a Scanning ArchitectureA Query Model for Ad Hoc Queries using a Scanning Architecture
A Query Model for Ad Hoc Queries using a Scanning ArchitectureFlurry, Inc.
 
Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101Splunk
 
October 2014 Webinar: Cybersecurity Threat Detection
October 2014 Webinar: Cybersecurity Threat DetectionOctober 2014 Webinar: Cybersecurity Threat Detection
October 2014 Webinar: Cybersecurity Threat DetectionSqrrl
 
Real time data processing frameworks
Real time data processing frameworksReal time data processing frameworks
Real time data processing frameworksIJDKP
 
Usage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics toolsUsage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics toolsDamir Delija
 
Hadoop / Spark on Malware Expression
Hadoop / Spark on Malware ExpressionHadoop / Spark on Malware Expression
Hadoop / Spark on Malware ExpressionMapR Technologies
 
Predictive Maintenance Using Recurrent Neural Networks
Predictive Maintenance Using Recurrent Neural NetworksPredictive Maintenance Using Recurrent Neural Networks
Predictive Maintenance Using Recurrent Neural NetworksJustin Brandenburg
 
Fast Start Failover DataGuard
Fast Start Failover DataGuardFast Start Failover DataGuard
Fast Start Failover DataGuardBorsaniya Vaibhav
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivitySqrrl
 
Performing network security analytics
Performing network security analyticsPerforming network security analytics
Performing network security analyticsDataWorks Summit
 
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...Angelo Corsaro
 

La actualidad más candente (19)

Splunk Insights
Splunk InsightsSplunk Insights
Splunk Insights
 
Splunk Discovery: Warsaw 2018 - Getting Data In
Splunk Discovery: Warsaw 2018 - Getting Data InSplunk Discovery: Warsaw 2018 - Getting Data In
Splunk Discovery: Warsaw 2018 - Getting Data In
 
Performing Network & Security Analytics with Hadoop
Performing Network & Security Analytics with HadoopPerforming Network & Security Analytics with Hadoop
Performing Network & Security Analytics with Hadoop
 
Just the sketch: advanced streaming analytics in Apache Metron
Just the sketch: advanced streaming analytics in Apache MetronJust the sketch: advanced streaming analytics in Apache Metron
Just the sketch: advanced streaming analytics in Apache Metron
 
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
 
Deep Learning in Security—An Empirical Example in User and Entity Behavior An...
Deep Learning in Security—An Empirical Example in User and Entity Behavior An...Deep Learning in Security—An Empirical Example in User and Entity Behavior An...
Deep Learning in Security—An Empirical Example in User and Entity Behavior An...
 
A Query Model for Ad Hoc Queries using a Scanning Architecture
A Query Model for Ad Hoc Queries using a Scanning ArchitectureA Query Model for Ad Hoc Queries using a Scanning Architecture
A Query Model for Ad Hoc Queries using a Scanning Architecture
 
Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101
 
October 2014 Webinar: Cybersecurity Threat Detection
October 2014 Webinar: Cybersecurity Threat DetectionOctober 2014 Webinar: Cybersecurity Threat Detection
October 2014 Webinar: Cybersecurity Threat Detection
 
Real time data processing frameworks
Real time data processing frameworksReal time data processing frameworks
Real time data processing frameworks
 
Usage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics toolsUsage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics tools
 
IoT underthe hood
IoT underthe hoodIoT underthe hood
IoT underthe hood
 
Hadoop / Spark on Malware Expression
Hadoop / Spark on Malware ExpressionHadoop / Spark on Malware Expression
Hadoop / Spark on Malware Expression
 
Predictive Maintenance Using Recurrent Neural Networks
Predictive Maintenance Using Recurrent Neural NetworksPredictive Maintenance Using Recurrent Neural Networks
Predictive Maintenance Using Recurrent Neural Networks
 
Fast Start Failover DataGuard
Fast Start Failover DataGuardFast Start Failover DataGuard
Fast Start Failover DataGuard
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
 
Performing network security analytics
Performing network security analyticsPerforming network security analytics
Performing network security analytics
 
Phissug s01 ep6, stretch database
Phissug s01 ep6, stretch databasePhissug s01 ep6, stretch database
Phissug s01 ep6, stretch database
 
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
 

Similar a Splunk for cyber_threat

Splunk for security
Splunk for securitySplunk for security
Splunk for securityGreg Hanchin
 
Security Analysis and Data Visualization
Security Analysis and Data VisualizationSecurity Analysis and Data Visualization
Security Analysis and Data VisualizationOluseyi Akindeinde
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_securityGreg Hanchin
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceSplunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for complianceGreg Hanchin
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for complianceGreg Hanchin
 
Analytics Driven SIEM Workshop
Analytics Driven SIEM WorkshopAnalytics Driven SIEM Workshop
Analytics Driven SIEM WorkshopSplunk
 
Splunk guide for_iso_27002
Splunk guide for_iso_27002Splunk guide for_iso_27002
Splunk guide for_iso_27002Greg Hanchin
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfBecky Burwell
 
Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk Splunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
What makes OSINT Methodologies Vital for Penetration Testing?
What makes OSINT Methodologies Vital for Penetration Testing?What makes OSINT Methodologies Vital for Penetration Testing?
What makes OSINT Methodologies Vital for Penetration Testing?Zoe Gilbert
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionSeamus Tuohy
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunk
 
Splunk for big_data
Splunk for big_dataSplunk for big_data
Splunk for big_dataGreg Hanchin
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through CorrelationAnton Chuvakin
 
Splunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions BriefSplunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions BriefManish Kalra
 

Similar a Splunk for cyber_threat (20)

Splunk for security
Splunk for securitySplunk for security
Splunk for security
 
Lookingglass whitepaper
Lookingglass whitepaperLookingglass whitepaper
Lookingglass whitepaper
 
Security Analysis and Data Visualization
Security Analysis and Data VisualizationSecurity Analysis and Data Visualization
Security Analysis and Data Visualization
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat Intelligence
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
 
Analytics Driven SIEM Workshop
Analytics Driven SIEM WorkshopAnalytics Driven SIEM Workshop
Analytics Driven SIEM Workshop
 
Splunk guide for_iso_27002
Splunk guide for_iso_27002Splunk guide for_iso_27002
Splunk guide for_iso_27002
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdf
 
Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
What makes OSINT Methodologies Vital for Penetration Testing?
What makes OSINT Methodologies Vital for Penetration Testing?What makes OSINT Methodologies Vital for Penetration Testing?
What makes OSINT Methodologies Vital for Penetration Testing?
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
 
Splunk for big_data
Splunk for big_dataSplunk for big_data
Splunk for big_data
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through Correlation
 
Splunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions BriefSplunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions Brief
 

Más de Greg Hanchin

Splunk for exchange
Splunk for exchangeSplunk for exchange
Splunk for exchangeGreg Hanchin
 
Splunk Searching and reporting 43course
Splunk Searching and reporting 43courseSplunk Searching and reporting 43course
Splunk Searching and reporting 43courseGreg Hanchin
 
Advanced Splunk 50 administration
Advanced Splunk 50 administrationAdvanced Splunk 50 administration
Advanced Splunk 50 administrationGreg Hanchin
 
Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Greg Hanchin
 
Administering splunk 43 course
Administering splunk 43 courseAdministering splunk 43 course
Administering splunk 43 courseGreg Hanchin
 
Using splunk43course
Using splunk43courseUsing splunk43course
Using splunk43courseGreg Hanchin
 
Using Splunk course outline
Using Splunk course outline Using Splunk course outline
Using Splunk course outline Greg Hanchin
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionGreg Hanchin
 
Administering Splunk course
Administering Splunk courseAdministering Splunk course
Administering Splunk courseGreg Hanchin
 
Splunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsSplunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsGreg Hanchin
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Greg Hanchin
 
Splunk forwarders tech_brief
Splunk forwarders tech_briefSplunk forwarders tech_brief
Splunk forwarders tech_briefGreg Hanchin
 
Splunk and map_reduce
Splunk and map_reduceSplunk and map_reduce
Splunk and map_reduceGreg Hanchin
 
Splunk for xen_desktop
Splunk for xen_desktopSplunk for xen_desktop
Splunk for xen_desktopGreg Hanchin
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_altoGreg Hanchin
 
Splunk for db_connect
Splunk for db_connectSplunk for db_connect
Splunk for db_connectGreg Hanchin
 
Splunk for active_directory
Splunk for active_directorySplunk for active_directory
Splunk for active_directoryGreg Hanchin
 

Más de Greg Hanchin (20)

Splunk for exchange
Splunk for exchangeSplunk for exchange
Splunk for exchange
 
Splunk Searching and reporting 43course
Splunk Searching and reporting 43courseSplunk Searching and reporting 43course
Splunk Searching and reporting 43course
 
Advanced Splunk 50 administration
Advanced Splunk 50 administrationAdvanced Splunk 50 administration
Advanced Splunk 50 administration
 
Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Advanced searching and reporting 50 course
Advanced searching and reporting 50 course
 
Administering splunk 43 course
Administering splunk 43 courseAdministering splunk 43 course
Administering splunk 43 course
 
Using splunk43course
Using splunk43courseUsing splunk43course
Using splunk43course
 
Using Splunk course outline
Using Splunk course outline Using Splunk course outline
Using Splunk course outline
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class description
 
Administering Splunk course
Administering Splunk courseAdministering Splunk course
Administering Splunk course
 
Splunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsSplunk Searching and Reporting Class Details
Splunk Searching and Reporting Class Details
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring
 
Splunk forwarders tech_brief
Splunk forwarders tech_briefSplunk forwarders tech_brief
Splunk forwarders tech_brief
 
Splunk and map_reduce
Splunk and map_reduceSplunk and map_reduce
Splunk and map_reduce
 
Splunk for xen_desktop
Splunk for xen_desktopSplunk for xen_desktop
Splunk for xen_desktop
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_alto
 
Splunk for ibtrm
Splunk for ibtrmSplunk for ibtrm
Splunk for ibtrm
 
Splunk for fisma
Splunk for fismaSplunk for fisma
Splunk for fisma
 
Splunk for f5
Splunk for f5Splunk for f5
Splunk for f5
 
Splunk for db_connect
Splunk for db_connectSplunk for db_connect
Splunk for db_connect
 
Splunk for active_directory
Splunk for active_directorySplunk for active_directory
Splunk for active_directory
 

Último

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Último (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Splunk for cyber_threat

  • 1. S O L U T I O N S G U I D E Splunk® for Cyber Threat Analysis A Big Data Approach to Enterprise Security Challenge of Discovering Known and Unknown Threats In today’s cyber battlefield a vast amount of information is commonly processed, aggregated and correlated to identify security incidents collected from the IT architecture. This effort largely represents looking for known threats—looking for incidents that have been pre-defined as security threats. The cyber analyst sets up behavioral rules that identify and match a level of response that is appropriate for a given security incident. These rules are commonly present in the detection technology itself or may be implemented via a security information and event management (SIEM) technology. From an enterprise security point of view, this methodology of aggregation and correlation is often targeted at the tier-1 data center level, which operates as the front-line defense of your IT security. The combination of human assets and technology falls under the broad term of CND (or computer network defense) and has represented the baseline for all SecOPS over the years. While current technologies and methods are still somewhat effective in identifying breeches, attackers have changed their methodologies and have made the “what you know” proposition much more difficult to quantify. Compounding the issue is the explosion of unstructured data from increasingly complex technologies that often do not fit nicely into the structured world of SIEM, which can impose artificial restrictions on the collection of specific data types and provide little visibility into attack patterns and context. In response to more sophisticated attacks, a new kind of cyber threat analyst has emerged operating at the tier-3 level. This analyst functions as a “security intelligence analyst” and is often called upon to perform detailed analysis upon a security incident. Rather than the point-in-time / predetermined analysis of the tier-1 analyst, the intelligence analyst must consider threats against a much larger pool of information, some machine generated and some human generated, over a significantly longer period of time. The unfortunate truth is that the pre-defined tools of the tier-1 analyst, which are designed to reduce the amount of data for analysis, are not suitable for the investigative needs of the security intelligence analyst. A Big Data Approach to Discovering Unknown Threats While Splunk can certainly address the tier-1 needs of reduction and correlation, Splunk was designed to support a new paradigm of data discovery. This shift rejects a data reduction strategy in favor of a data inclusion strategy. This supports analysis of very large datasets through data indexing and MapReduce functionality pioneered by Google. This gives Splunk the ability to collect data from virtually any available data source without normalization at collection time and analyze security incidents using analytics and statistical analysis. Other Splunk functionality often leveraged for threat analysis includes: Indexed data storage with automated field extraction. Splunk does not store data in a traditional schema-based row and column format: events are free to be interpreted as they are. This is especially important where the event presents ‘multi-value’ fields such as an event that can write multiple values for the same field in the same event. This is a common issue in data sources that track SMTP addresses. The addresses the data sources contain are often variable. Using Splunk, each of these would be extracted out separately regardless of the actual event. Statistical analysis command language. Splunk offers a ‘search language’ rather than an SQL-style query language. While an SQL language is adequate for searching what you know (such as values in columns that are indexed) it is not adequate for handling ad-hoc queries since it is a very structured language designed to blindly ‘dump’ the contents of a cell. In contrast, the Splunk search language offers a much greater freedom in formulating questions on the fly with a search-friendly interface that is focused more on acquiring answers rather than formatting questions. Additionally, much of the search language is designed to manipulate the data not just save it. For instance, the Splunk stats command can process a field any number of ways such as averaging, first value, list, max, mean, mode, percentile, per-hour, range, standard deviation, sum and variance—just to name a few. The ability to ask nearly any conceivable question of the data rather than simply dumping the data is a key capability for threat analysis. Add knowledge to make Splunk smarter. The Splunk function of tagging, when combined with the ability to scale to incredibly large datasets allows threat analysts to classify data independent of its source. This can be as simple as classifying a particular IP address as ‘hostile,’ which then gets turned into an IP-hostile report or classified by IP address report that can be analyzed separately. Since tagging is performed at search time rather than at index time, you can view data by different
  • 2. www.splunk.com S O L U T I O N S G U I D E 250 Brannan St, San Francisco, CA, 94107 info@splunk.com | sales@splunk.com 866-438-7758 | 415-848-8400 www.splunkbase.com Copyright © 2012 Splunk Inc. All rights reserved. Splunk Enterprise is protected by U.S. and international copyright and intellectual property laws. Splunk is a registered trademark or trademark of Splunk Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item # SG-Splunk-Security-106 time slices–this is especially important for handling “watch lists.” While these lists might change on a daily basis, the relevant data collected against them can extend back months. Splunk can also ‘learn’ IP address changes for malicious websites through correlation of DNS and Netflow data. Add data for event context. Lookup tables provide another invaluable function to the threat analyst. Lookup tables allow repository data to be merged with event data. For example, a repository of human resources data such as name, phone number and physical location can form the lookup based on the MAC address of a computer. Since lookups can also be temporal in nature, an IDS event can be used to look up DHCP data to acquire the MAC address--which can then be used to lookup the HR data. Thus, every IDS event from an internal node can be associated temporally with a name, contact and location. Splunk can dynamically create these tables based on event data and monitor them for any length of time. Data access procedures and processes can be monitored and given context without the manual effort involved with piecing together all the data that must be collected. In today’s environment, users are often assigned multiple devices. Using the above method and lookups to Active Directory or an HR database, a threat analysts would be able to ask the data to “Show all devices for ‘Bill’ across the IT architecture and determine process violations.” Accelerate forensic analysis across data types. Associated with lookup tables, workflows actions allow interactions between fields and other web sources. For instance, a workflow might be created to perform a WHOIS on an IP address or perhaps a click-on-demand function to request “port details” from the Internet Storm Center. Acquisition of third-party information in a timely fashion is another key to the success of the threat analyst. Collect data when you want without altering its format. Depending on vendor support for specific data types is the number one complaint of many security practitioners. Splunk is data agnostic. No normalization is required for Splunk to gather data. As long as the data is ASCII or is UTF-8 compliant, Splunk will consume data much like a human consumes data -- if it’s readable, it’s consumable. While this is very handy for bringing in any dataset that might be present during an investigation with a minimum of work, for the threat analyst, it represents an ability to think outside the box—by bringing all the data in the enterprise architecture to bear in a specific problem. COTS products often miss threats that only present themselves as abnormal patterns in normal IT data. Sometimes it takes ingenuity, creativity and out-of-the-box thinking when dealing with threats that can hide behind normal credentialed user activities. Splunk is the technology that facilitates such thinking. S O L U T I O N S G U I D E Successful security intelligence analysts must be agile and adept at thinking “outside of the box.” Additionally, they must be capable of considering a wide range of data that often changes during the course of the investigation. Splunk is a platform designed to facilitate these requirements and provide the threat analyst the ability to use any and all IT data to accomplish their mission objectives such as: Perform research on adversarial threats posed to various systems, technologies, operations or missions in appropriate intelligence sources Analyze collected data to derive facts, inferences and projections concerning capabilities, intentions, attack approaches, and likelihood of various adversarial attacks under various situations Use context to more accurately determine false-positives and false-negatives. Research resource allocations, motivations, tendencies, personalities and tolerance for detection, attribution and retribution that influence adversarial decisions Contribute to profiling adversarial behavior with respect to identified system attacks in an operational mission context Produce formal and informal reports, briefings, and perspectives of the behavior of adversaries against target systems, technologies, operations and missions Free Download Download Splunk for free. You’ll get a Splunk Enterprise license for 60 days and you can index up to 500 megabytes of data per day. You can convert to a perpetual Free license or purchase an Enterprise license by contacting sales@splunk.com.