SlideShare a Scribd company logo
S O L U T I O N S G U I D E
Splunk® for Cyber Threat Analysis
A Big Data Approach to Enterprise Security
Challenge of Discovering Known and Unknown
Threats
In today’s cyber battlefield a vast amount of information is
commonly processed, aggregated and correlated to identify
security incidents collected from the IT architecture. This effort
largely represents looking for known threats—looking for
incidents that have been pre-defined as security threats. The
cyber analyst sets up behavioral rules that identify and match a
level of response that is appropriate for a given security incident.
These rules are commonly present in the detection technology
itself or may be implemented via a security information and
event management (SIEM) technology.
From an enterprise security point of view, this methodology of
aggregation and correlation is often targeted at the tier-1 data
center level, which operates as the front-line defense of your IT
security. The combination of human assets and technology falls
under the broad term of CND (or computer network defense)
and has represented the baseline for all SecOPS over the years.
While current technologies and methods are still somewhat
effective in identifying breeches, attackers have changed their
methodologies and have made the “what you know” proposition
much more difficult to quantify. Compounding the issue is
the explosion of unstructured data from increasingly complex
technologies that often do not fit nicely into the structured world
of SIEM, which can impose artificial restrictions on the collection
of specific data types and provide little visibility into attack
patterns and context.
In response to more sophisticated attacks, a new kind of cyber
threat analyst has emerged operating at the tier-3 level. This
analyst functions as a “security intelligence analyst” and is
often called upon to perform detailed analysis upon a security
incident. Rather than the point-in-time / predetermined
analysis of the tier-1 analyst, the intelligence analyst must
consider threats against a much larger pool of information,
some machine generated and some human generated, over a
significantly longer period of time. The unfortunate truth is that
the pre-defined tools of the tier-1 analyst, which are designed to
reduce the amount of data for analysis, are not suitable for the
investigative needs of the security intelligence analyst.
A Big Data Approach to Discovering Unknown
Threats
While Splunk can certainly address the tier-1 needs of reduction
and correlation, Splunk was designed to support a new paradigm
of data discovery. This shift rejects a data reduction strategy
in favor of a data inclusion strategy. This supports analysis of
very large datasets through data indexing and MapReduce
functionality pioneered by Google. This gives Splunk the ability
to collect data from virtually any available data source without
normalization at collection time and analyze security incidents
using analytics and statistical analysis.
Other Splunk functionality often leveraged for
threat analysis includes:
Indexed data storage with automated field extraction.
Splunk does not store data in a traditional schema-based
row and column format: events are free to be interpreted
as they are. This is especially important where the event
presents ‘multi-value’ fields such as an event that can
write multiple values for the same field in the same event.
This is a common issue in data sources that track SMTP
addresses. The addresses the data sources contain are
often variable. Using Splunk, each of these would be
extracted out separately regardless of the actual event.
Statistical analysis command language. Splunk offers
a ‘search language’ rather than an SQL-style query
language. While an SQL language is adequate for
searching what you know (such as values in columns that
are indexed) it is not adequate for handling ad-hoc queries
since it is a very structured language designed to blindly
‘dump’ the contents of a cell. In contrast, the Splunk search
language offers a much greater freedom in formulating
questions on the fly with a search-friendly interface that is
focused more on acquiring answers rather than formatting
questions. Additionally, much of the search language
is designed to manipulate the data not just save it. For
instance, the Splunk stats command can process a field
any number of ways such as averaging, first value, list,
max, mean, mode, percentile, per-hour, range, standard
deviation, sum and variance—just to name a few. The
ability to ask nearly any conceivable question of the data
rather than simply dumping the data is a key capability for
threat analysis.
Add knowledge to make Splunk smarter. The Splunk
function of tagging, when combined with the ability to
scale to incredibly large datasets allows threat analysts
to classify data independent of its source. This can
be as simple as classifying a particular IP address as
‘hostile,’ which then gets turned into an IP-hostile report
or classified by IP address report that can be analyzed
separately. Since tagging is performed at search time
rather than at index time, you can view data by different
www.splunk.com
S O L U T I O N S G U I D E
250 Brannan St, San Francisco, CA, 94107 info@splunk.com | sales@splunk.com 866-438-7758 | 415-848-8400 www.splunkbase.com
Copyright © 2012 Splunk Inc. All rights reserved. Splunk Enterprise is protected by U.S. and international copyright and intellectual property laws.
Splunk is a registered trademark or trademark of Splunk Inc. in the United States and/or other jurisdictions. All other marks and names mentioned
herein may be trademarks of their respective companies. Item # SG-Splunk-Security-106
time slices–this is especially important for handling “watch
lists.” While these lists might change on a daily basis, the
relevant data collected against them can extend back
months. Splunk can also ‘learn’ IP address changes for
malicious websites through correlation of DNS and Netflow
data.
Add data for event context. Lookup tables provide
another invaluable function to the threat analyst. Lookup
tables allow repository data to be merged with event
data. For example, a repository of human resources data
such as name, phone number and physical location can
form the lookup based on the MAC address of a computer.
Since lookups can also be temporal in nature, an IDS
event can be used to look up DHCP data to acquire the
MAC address--which can then be used to lookup the HR
data. Thus, every IDS event from an internal node can be
associated temporally with a name, contact and location.
Splunk can dynamically create these tables based on event
data and monitor them for any length of time. Data access
procedures and processes can be monitored and given
context without the manual effort involved with piecing
together all the data that must be collected. In today’s
environment, users are often assigned multiple devices.
Using the above method and lookups to Active Directory
or an HR database, a threat analysts would be able to
ask the data to “Show all devices for ‘Bill’ across the IT
architecture and determine process violations.”
Accelerate forensic analysis across data types.
Associated with lookup tables, workflows actions allow
interactions between fields and other web sources. For
instance, a workflow might be created to perform a WHOIS
on an IP address or perhaps a click-on-demand function
to request “port details” from the Internet Storm Center.
Acquisition of third-party information in a timely fashion is
another key to the success of the threat analyst.
Collect data when you want without altering its format.
Depending on vendor support for specific data types is
the number one complaint of many security practitioners.
Splunk is data agnostic. No normalization is required for
Splunk to gather data. As long as the data is ASCII or is
UTF-8 compliant, Splunk will consume data much like a
human consumes data -- if it’s readable, it’s consumable.
While this is very handy for bringing in any dataset that
might be present during an investigation with a minimum
of work, for the threat analyst, it represents an ability
to think outside the box—by bringing all the data in the
enterprise architecture to bear in a specific problem. COTS
products often miss threats that only present themselves
as abnormal patterns in normal IT data. Sometimes it
takes ingenuity, creativity and out-of-the-box thinking
when dealing with threats that can hide behind normal
credentialed user activities. Splunk is the technology that
facilitates such thinking.
S O L U T I O N S G U I D E
Successful security intelligence analysts must be agile and adept
at thinking “outside of the box.” Additionally, they must be
capable of considering a wide range of data that often changes
during the course of the investigation. Splunk is a platform
designed to facilitate these requirements and provide the threat
analyst the ability to use any and all IT data to accomplish their
mission objectives such as:
Perform research on adversarial threats posed to
various systems, technologies, operations or missions in
appropriate intelligence sources
Analyze collected data to derive facts, inferences and
projections concerning capabilities, intentions, attack
approaches, and likelihood of various adversarial attacks
under various situations
Use context to more accurately determine false-positives
and false-negatives.
Research resource allocations, motivations, tendencies,
personalities and tolerance for detection, attribution and
retribution that influence adversarial decisions
Contribute to profiling adversarial behavior with respect to
identified system attacks in an operational mission context
Produce formal and informal reports, briefings, and
perspectives of the behavior of adversaries against target
systems, technologies, operations and missions
Free Download
Download Splunk for free. You’ll get a Splunk Enterprise license
for 60 days and you can index up to 500 megabytes of data per
day. You can convert to a perpetual Free license or purchase an
Enterprise license by contacting sales@splunk.com.

More Related Content

What's hot

Splunk Insights
Splunk InsightsSplunk Insights
Splunk Insights
Sunil Kumar
 
Splunk Discovery: Warsaw 2018 - Getting Data In
Splunk Discovery: Warsaw 2018 - Getting Data InSplunk Discovery: Warsaw 2018 - Getting Data In
Splunk Discovery: Warsaw 2018 - Getting Data In
Splunk
 
Performing Network & Security Analytics with Hadoop
Performing Network & Security Analytics with HadoopPerforming Network & Security Analytics with Hadoop
Performing Network & Security Analytics with HadoopDataWorks Summit
 
Just the sketch: advanced streaming analytics in Apache Metron
Just the sketch: advanced streaming analytics in Apache MetronJust the sketch: advanced streaming analytics in Apache Metron
Just the sketch: advanced streaming analytics in Apache Metron
DataWorks Summit
 
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
IJNSA Journal
 
Deep Learning in Security—An Empirical Example in User and Entity Behavior An...
Deep Learning in Security—An Empirical Example in User and Entity Behavior An...Deep Learning in Security—An Empirical Example in User and Entity Behavior An...
Deep Learning in Security—An Empirical Example in User and Entity Behavior An...
Databricks
 
A Query Model for Ad Hoc Queries using a Scanning Architecture
A Query Model for Ad Hoc Queries using a Scanning ArchitectureA Query Model for Ad Hoc Queries using a Scanning Architecture
A Query Model for Ad Hoc Queries using a Scanning Architecture
Flurry, Inc.
 
Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101
Splunk
 
October 2014 Webinar: Cybersecurity Threat Detection
October 2014 Webinar: Cybersecurity Threat DetectionOctober 2014 Webinar: Cybersecurity Threat Detection
October 2014 Webinar: Cybersecurity Threat Detection
Sqrrl
 
Real time data processing frameworks
Real time data processing frameworksReal time data processing frameworks
Real time data processing frameworks
IJDKP
 
Usage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics toolsUsage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics tools
Damir Delija
 
IoT underthe hood
IoT underthe hoodIoT underthe hood
IoT underthe hood
Dave Callaghan
 
Hadoop / Spark on Malware Expression
Hadoop / Spark on Malware ExpressionHadoop / Spark on Malware Expression
Hadoop / Spark on Malware Expression
MapR Technologies
 
Predictive Maintenance Using Recurrent Neural Networks
Predictive Maintenance Using Recurrent Neural NetworksPredictive Maintenance Using Recurrent Neural Networks
Predictive Maintenance Using Recurrent Neural Networks
Justin Brandenburg
 
Fast Start Failover DataGuard
Fast Start Failover DataGuardFast Start Failover DataGuard
Fast Start Failover DataGuard
Borsaniya Vaibhav
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
Sqrrl
 
Performing network security analytics
Performing network security analyticsPerforming network security analytics
Performing network security analyticsDataWorks Summit
 
Phissug s01 ep6, stretch database
Phissug s01 ep6, stretch databasePhissug s01 ep6, stretch database
Phissug s01 ep6, stretch database
Argelo Royce Bautista
 
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Angelo Corsaro
 

What's hot (19)

Splunk Insights
Splunk InsightsSplunk Insights
Splunk Insights
 
Splunk Discovery: Warsaw 2018 - Getting Data In
Splunk Discovery: Warsaw 2018 - Getting Data InSplunk Discovery: Warsaw 2018 - Getting Data In
Splunk Discovery: Warsaw 2018 - Getting Data In
 
Performing Network & Security Analytics with Hadoop
Performing Network & Security Analytics with HadoopPerforming Network & Security Analytics with Hadoop
Performing Network & Security Analytics with Hadoop
 
Just the sketch: advanced streaming analytics in Apache Metron
Just the sketch: advanced streaming analytics in Apache MetronJust the sketch: advanced streaming analytics in Apache Metron
Just the sketch: advanced streaming analytics in Apache Metron
 
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
 
Deep Learning in Security—An Empirical Example in User and Entity Behavior An...
Deep Learning in Security—An Empirical Example in User and Entity Behavior An...Deep Learning in Security—An Empirical Example in User and Entity Behavior An...
Deep Learning in Security—An Empirical Example in User and Entity Behavior An...
 
A Query Model for Ad Hoc Queries using a Scanning Architecture
A Query Model for Ad Hoc Queries using a Scanning ArchitectureA Query Model for Ad Hoc Queries using a Scanning Architecture
A Query Model for Ad Hoc Queries using a Scanning Architecture
 
Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101
 
October 2014 Webinar: Cybersecurity Threat Detection
October 2014 Webinar: Cybersecurity Threat DetectionOctober 2014 Webinar: Cybersecurity Threat Detection
October 2014 Webinar: Cybersecurity Threat Detection
 
Real time data processing frameworks
Real time data processing frameworksReal time data processing frameworks
Real time data processing frameworks
 
Usage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics toolsUsage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics tools
 
IoT underthe hood
IoT underthe hoodIoT underthe hood
IoT underthe hood
 
Hadoop / Spark on Malware Expression
Hadoop / Spark on Malware ExpressionHadoop / Spark on Malware Expression
Hadoop / Spark on Malware Expression
 
Predictive Maintenance Using Recurrent Neural Networks
Predictive Maintenance Using Recurrent Neural NetworksPredictive Maintenance Using Recurrent Neural Networks
Predictive Maintenance Using Recurrent Neural Networks
 
Fast Start Failover DataGuard
Fast Start Failover DataGuardFast Start Failover DataGuard
Fast Start Failover DataGuard
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
 
Performing network security analytics
Performing network security analyticsPerforming network security analytics
Performing network security analytics
 
Phissug s01 ep6, stretch database
Phissug s01 ep6, stretch databasePhissug s01 ep6, stretch database
Phissug s01 ep6, stretch database
 
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
 

Similar to Splunk for cyber_threat

Splunk for security
Splunk for securitySplunk for security
Splunk for security
Greg Hanchin
 
Security Analysis and Data Visualization
Security Analysis and Data VisualizationSecurity Analysis and Data Visualization
Security Analysis and Data VisualizationOluseyi Akindeinde
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
Greg Hanchin
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Splunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
Splunk
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
Greg Hanchin
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
Greg Hanchin
 
Analytics Driven SIEM Workshop
Analytics Driven SIEM WorkshopAnalytics Driven SIEM Workshop
Analytics Driven SIEM Workshop
Splunk
 
Splunk guide for_iso_27002
Splunk guide for_iso_27002Splunk guide for_iso_27002
Splunk guide for_iso_27002
Greg Hanchin
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdf
Becky Burwell
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
Splunk
 
Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk
Splunk
 
What makes OSINT Methodologies Vital for Penetration Testing?
What makes OSINT Methodologies Vital for Penetration Testing?What makes OSINT Methodologies Vital for Penetration Testing?
What makes OSINT Methodologies Vital for Penetration Testing?
Zoe Gilbert
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
Seamus Tuohy
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunk
 
Splunk for big_data
Splunk for big_dataSplunk for big_data
Splunk for big_data
Greg Hanchin
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
Splunk
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through Correlation
Anton Chuvakin
 
Splunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions BriefSplunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions BriefManish Kalra
 

Similar to Splunk for cyber_threat (20)

Splunk for security
Splunk for securitySplunk for security
Splunk for security
 
Lookingglass whitepaper
Lookingglass whitepaperLookingglass whitepaper
Lookingglass whitepaper
 
Security Analysis and Data Visualization
Security Analysis and Data VisualizationSecurity Analysis and Data Visualization
Security Analysis and Data Visualization
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat Intelligence
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
 
Analytics Driven SIEM Workshop
Analytics Driven SIEM WorkshopAnalytics Driven SIEM Workshop
Analytics Driven SIEM Workshop
 
Splunk guide for_iso_27002
Splunk guide for_iso_27002Splunk guide for_iso_27002
Splunk guide for_iso_27002
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdf
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk
 
What makes OSINT Methodologies Vital for Penetration Testing?
What makes OSINT Methodologies Vital for Penetration Testing?What makes OSINT Methodologies Vital for Penetration Testing?
What makes OSINT Methodologies Vital for Penetration Testing?
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
 
Splunk for big_data
Splunk for big_dataSplunk for big_data
Splunk for big_data
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through Correlation
 
Splunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions BriefSplunk Enterprise 6.1 Solutions Brief
Splunk Enterprise 6.1 Solutions Brief
 

More from Greg Hanchin

Splunk for exchange
Splunk for exchangeSplunk for exchange
Splunk for exchange
Greg Hanchin
 
Splunk Searching and reporting 43course
Splunk Searching and reporting 43courseSplunk Searching and reporting 43course
Splunk Searching and reporting 43course
Greg Hanchin
 
Advanced Splunk 50 administration
Advanced Splunk 50 administrationAdvanced Splunk 50 administration
Advanced Splunk 50 administration
Greg Hanchin
 
Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Advanced searching and reporting 50 course
Advanced searching and reporting 50 course
Greg Hanchin
 
Administering splunk 43 course
Administering splunk 43 courseAdministering splunk 43 course
Administering splunk 43 course
Greg Hanchin
 
Using splunk43course
Using splunk43courseUsing splunk43course
Using splunk43course
Greg Hanchin
 
Using Splunk course outline
Using Splunk course outline Using Splunk course outline
Using Splunk course outline
Greg Hanchin
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class description
Greg Hanchin
 
Administering Splunk course
Administering Splunk courseAdministering Splunk course
Administering Splunk course
Greg Hanchin
 
Splunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsSplunk Searching and Reporting Class Details
Splunk Searching and Reporting Class Details
Greg Hanchin
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring
Greg Hanchin
 
Splunk forwarders tech_brief
Splunk forwarders tech_briefSplunk forwarders tech_brief
Splunk forwarders tech_brief
Greg Hanchin
 
Splunk and map_reduce
Splunk and map_reduceSplunk and map_reduce
Splunk and map_reduce
Greg Hanchin
 
Splunk for xen_desktop
Splunk for xen_desktopSplunk for xen_desktop
Splunk for xen_desktop
Greg Hanchin
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_alto
Greg Hanchin
 
Splunk for ibtrm
Splunk for ibtrmSplunk for ibtrm
Splunk for ibtrm
Greg Hanchin
 
Splunk for fisma
Splunk for fismaSplunk for fisma
Splunk for fisma
Greg Hanchin
 
Splunk for f5
Splunk for f5Splunk for f5
Splunk for f5
Greg Hanchin
 
Splunk for db_connect
Splunk for db_connectSplunk for db_connect
Splunk for db_connect
Greg Hanchin
 
Splunk for active_directory
Splunk for active_directorySplunk for active_directory
Splunk for active_directory
Greg Hanchin
 

More from Greg Hanchin (20)

Splunk for exchange
Splunk for exchangeSplunk for exchange
Splunk for exchange
 
Splunk Searching and reporting 43course
Splunk Searching and reporting 43courseSplunk Searching and reporting 43course
Splunk Searching and reporting 43course
 
Advanced Splunk 50 administration
Advanced Splunk 50 administrationAdvanced Splunk 50 administration
Advanced Splunk 50 administration
 
Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Advanced searching and reporting 50 course
Advanced searching and reporting 50 course
 
Administering splunk 43 course
Administering splunk 43 courseAdministering splunk 43 course
Administering splunk 43 course
 
Using splunk43course
Using splunk43courseUsing splunk43course
Using splunk43course
 
Using Splunk course outline
Using Splunk course outline Using Splunk course outline
Using Splunk course outline
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class description
 
Administering Splunk course
Administering Splunk courseAdministering Splunk course
Administering Splunk course
 
Splunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsSplunk Searching and Reporting Class Details
Splunk Searching and Reporting Class Details
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring
 
Splunk forwarders tech_brief
Splunk forwarders tech_briefSplunk forwarders tech_brief
Splunk forwarders tech_brief
 
Splunk and map_reduce
Splunk and map_reduceSplunk and map_reduce
Splunk and map_reduce
 
Splunk for xen_desktop
Splunk for xen_desktopSplunk for xen_desktop
Splunk for xen_desktop
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_alto
 
Splunk for ibtrm
Splunk for ibtrmSplunk for ibtrm
Splunk for ibtrm
 
Splunk for fisma
Splunk for fismaSplunk for fisma
Splunk for fisma
 
Splunk for f5
Splunk for f5Splunk for f5
Splunk for f5
 
Splunk for db_connect
Splunk for db_connectSplunk for db_connect
Splunk for db_connect
 
Splunk for active_directory
Splunk for active_directorySplunk for active_directory
Splunk for active_directory
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Splunk for cyber_threat

  • 1. S O L U T I O N S G U I D E Splunk® for Cyber Threat Analysis A Big Data Approach to Enterprise Security Challenge of Discovering Known and Unknown Threats In today’s cyber battlefield a vast amount of information is commonly processed, aggregated and correlated to identify security incidents collected from the IT architecture. This effort largely represents looking for known threats—looking for incidents that have been pre-defined as security threats. The cyber analyst sets up behavioral rules that identify and match a level of response that is appropriate for a given security incident. These rules are commonly present in the detection technology itself or may be implemented via a security information and event management (SIEM) technology. From an enterprise security point of view, this methodology of aggregation and correlation is often targeted at the tier-1 data center level, which operates as the front-line defense of your IT security. The combination of human assets and technology falls under the broad term of CND (or computer network defense) and has represented the baseline for all SecOPS over the years. While current technologies and methods are still somewhat effective in identifying breeches, attackers have changed their methodologies and have made the “what you know” proposition much more difficult to quantify. Compounding the issue is the explosion of unstructured data from increasingly complex technologies that often do not fit nicely into the structured world of SIEM, which can impose artificial restrictions on the collection of specific data types and provide little visibility into attack patterns and context. In response to more sophisticated attacks, a new kind of cyber threat analyst has emerged operating at the tier-3 level. This analyst functions as a “security intelligence analyst” and is often called upon to perform detailed analysis upon a security incident. Rather than the point-in-time / predetermined analysis of the tier-1 analyst, the intelligence analyst must consider threats against a much larger pool of information, some machine generated and some human generated, over a significantly longer period of time. The unfortunate truth is that the pre-defined tools of the tier-1 analyst, which are designed to reduce the amount of data for analysis, are not suitable for the investigative needs of the security intelligence analyst. A Big Data Approach to Discovering Unknown Threats While Splunk can certainly address the tier-1 needs of reduction and correlation, Splunk was designed to support a new paradigm of data discovery. This shift rejects a data reduction strategy in favor of a data inclusion strategy. This supports analysis of very large datasets through data indexing and MapReduce functionality pioneered by Google. This gives Splunk the ability to collect data from virtually any available data source without normalization at collection time and analyze security incidents using analytics and statistical analysis. Other Splunk functionality often leveraged for threat analysis includes: Indexed data storage with automated field extraction. Splunk does not store data in a traditional schema-based row and column format: events are free to be interpreted as they are. This is especially important where the event presents ‘multi-value’ fields such as an event that can write multiple values for the same field in the same event. This is a common issue in data sources that track SMTP addresses. The addresses the data sources contain are often variable. Using Splunk, each of these would be extracted out separately regardless of the actual event. Statistical analysis command language. Splunk offers a ‘search language’ rather than an SQL-style query language. While an SQL language is adequate for searching what you know (such as values in columns that are indexed) it is not adequate for handling ad-hoc queries since it is a very structured language designed to blindly ‘dump’ the contents of a cell. In contrast, the Splunk search language offers a much greater freedom in formulating questions on the fly with a search-friendly interface that is focused more on acquiring answers rather than formatting questions. Additionally, much of the search language is designed to manipulate the data not just save it. For instance, the Splunk stats command can process a field any number of ways such as averaging, first value, list, max, mean, mode, percentile, per-hour, range, standard deviation, sum and variance—just to name a few. The ability to ask nearly any conceivable question of the data rather than simply dumping the data is a key capability for threat analysis. Add knowledge to make Splunk smarter. The Splunk function of tagging, when combined with the ability to scale to incredibly large datasets allows threat analysts to classify data independent of its source. This can be as simple as classifying a particular IP address as ‘hostile,’ which then gets turned into an IP-hostile report or classified by IP address report that can be analyzed separately. Since tagging is performed at search time rather than at index time, you can view data by different
  • 2. www.splunk.com S O L U T I O N S G U I D E 250 Brannan St, San Francisco, CA, 94107 info@splunk.com | sales@splunk.com 866-438-7758 | 415-848-8400 www.splunkbase.com Copyright © 2012 Splunk Inc. All rights reserved. Splunk Enterprise is protected by U.S. and international copyright and intellectual property laws. Splunk is a registered trademark or trademark of Splunk Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item # SG-Splunk-Security-106 time slices–this is especially important for handling “watch lists.” While these lists might change on a daily basis, the relevant data collected against them can extend back months. Splunk can also ‘learn’ IP address changes for malicious websites through correlation of DNS and Netflow data. Add data for event context. Lookup tables provide another invaluable function to the threat analyst. Lookup tables allow repository data to be merged with event data. For example, a repository of human resources data such as name, phone number and physical location can form the lookup based on the MAC address of a computer. Since lookups can also be temporal in nature, an IDS event can be used to look up DHCP data to acquire the MAC address--which can then be used to lookup the HR data. Thus, every IDS event from an internal node can be associated temporally with a name, contact and location. Splunk can dynamically create these tables based on event data and monitor them for any length of time. Data access procedures and processes can be monitored and given context without the manual effort involved with piecing together all the data that must be collected. In today’s environment, users are often assigned multiple devices. Using the above method and lookups to Active Directory or an HR database, a threat analysts would be able to ask the data to “Show all devices for ‘Bill’ across the IT architecture and determine process violations.” Accelerate forensic analysis across data types. Associated with lookup tables, workflows actions allow interactions between fields and other web sources. For instance, a workflow might be created to perform a WHOIS on an IP address or perhaps a click-on-demand function to request “port details” from the Internet Storm Center. Acquisition of third-party information in a timely fashion is another key to the success of the threat analyst. Collect data when you want without altering its format. Depending on vendor support for specific data types is the number one complaint of many security practitioners. Splunk is data agnostic. No normalization is required for Splunk to gather data. As long as the data is ASCII or is UTF-8 compliant, Splunk will consume data much like a human consumes data -- if it’s readable, it’s consumable. While this is very handy for bringing in any dataset that might be present during an investigation with a minimum of work, for the threat analyst, it represents an ability to think outside the box—by bringing all the data in the enterprise architecture to bear in a specific problem. COTS products often miss threats that only present themselves as abnormal patterns in normal IT data. Sometimes it takes ingenuity, creativity and out-of-the-box thinking when dealing with threats that can hide behind normal credentialed user activities. Splunk is the technology that facilitates such thinking. S O L U T I O N S G U I D E Successful security intelligence analysts must be agile and adept at thinking “outside of the box.” Additionally, they must be capable of considering a wide range of data that often changes during the course of the investigation. Splunk is a platform designed to facilitate these requirements and provide the threat analyst the ability to use any and all IT data to accomplish their mission objectives such as: Perform research on adversarial threats posed to various systems, technologies, operations or missions in appropriate intelligence sources Analyze collected data to derive facts, inferences and projections concerning capabilities, intentions, attack approaches, and likelihood of various adversarial attacks under various situations Use context to more accurately determine false-positives and false-negatives. Research resource allocations, motivations, tendencies, personalities and tolerance for detection, attribution and retribution that influence adversarial decisions Contribute to profiling adversarial behavior with respect to identified system attacks in an operational mission context Produce formal and informal reports, briefings, and perspectives of the behavior of adversaries against target systems, technologies, operations and missions Free Download Download Splunk for free. You’ll get a Splunk Enterprise license for 60 days and you can index up to 500 megabytes of data per day. You can convert to a perpetual Free license or purchase an Enterprise license by contacting sales@splunk.com.