SlideShare a Scribd company logo
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Using Splunk to Defend Against
Advanced Threats
Shailendra Sadh - CISSP | Senior Sales Engineer
November 2017
© 2017 SPLUNK INC.
During the course of this presentation, we may make forward-looking statements regarding future events or
the expected performance of the company. We caution you that such statements reflect our current
expectations and estimates based on factors currently known to us and that actual events or results could
differ materially. For important factors that may cause actual results to differ from those contained in our
forward-looking statements, please review our filings with the SEC.
The forward-looking statements made in this presentation are being made as of the time and date of its live
presentation. If reviewed after its live presentation, this presentation may not contain current or accurate
information. We do not assume any obligation to update any forward-looking statements we may make. In
addition, any information about our roadmap outlines our general product direction and is subject to change
at any time without notice. It is for informational purposes only and shall not be incorporated into any contract
or other commitment. Splunk undertakes no obligation either to develop the features or functionality
described or to include any such feature or functionality in a future release.
Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in
the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2017 Splunk Inc. All rights reserved.
Forward-Looking Statements
© 2017 SPLUNK INC.
Agenda
▶ Ideology Behind Defense Mechanism
▶ Overview of Advanced Threats
▶ Breach Indicators
▶ Example Searches
▶ Using Data Science for Detection
© 2017 SPLUNK INC.
Poll Question#1
What is the most pressing challenge that you currently face in
your organization for managing & mitigating advanced threats?
© 2017 SPLUNK INC.
Why are we here?
What we will NOT talk about? What we will talk about?
© 2017 SPLUNK INC.
Ideology Behind
Defense Mechanisms
© 2017 SPLUNK INC.
Reference -http://www.asianentrepreneur.org/tips-lessons-from-sun-tzus-art-of-war-entrepreneurship/
© 2017 SPLUNK INC.
Poll Question#2
Do you know/believe that you have visibility across all the data
sources & assets across your organization?
© 2017 SPLUNK INC.
Critical Security Controls
Know Yourself
© 2017 SPLUNK INC.
Critical Security Controls
Know Yourself
© 2017 SPLUNK INC.
Critical Security Controls
Know Yourself
© 2017 SPLUNK INC.
© 2017 SPLUNK INC.
Know Yourself
© 2017 SPLUNK INC.
But… Who is the enemy…
© 2017 SPLUNK INC.
Poll Question#3
How confident are you, in your current capabilities to proactively
detect & defend against advanced threats possibly targeting your
environment?
© 2017 SPLUNK INC.
Know your Enemy
EXPECTATION
© 2017 SPLUNK INC.
Know your Enemy
REALITY
Script Kiddie
Insider Threat
Nation State/Focused Group
© 2017 SPLUNK INC.
Overview of
Advanced Threats
© 2017 SPLUNK INC.
Definition
ADVANCED PERSISTENT THREAT
• Adversary	can	act	in	Full	Spectrum	of	
Intrusion.
• Can	Utilize	publicly	available	exploits	
• Or	Build	his/her	own	exploits based	on	
target’s	Posture.	
• Formally	Tasked	to	accomplish	the	
Mission.
• Not	Opportunistic	Intruders.	
• Maintain	a	level	of	Interaction to	
execute	their	objectives.	
• Not	Just	a	piece	of	mindless	code	
wreaking	havoc.
• Dedicated	attackers	trying	to	control	the	
victim,	steal	the	data.
• Driven	by	objective	Political,	Economical,	
Competitive
Reference - https://taosecurity.blogspot.ae/2010/01/what-is-apt-and-what-does-it-want.html
© 2017 SPLUNK INC.
Adversary Perspective – Attack Kill Chain
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and
Control (C2)
Actions on
Objectives
http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf
© 2017 SPLUNK INC.
Kill Chain – Breach Example
Threat
intelligence
Access/Identity
Endpoint
Network
Delivery Exploitation Installation Actions on Objectives
Attacker hacks website.
Steals .pdf files
Web Portal
C2
© 2017 SPLUNK INC.
Kill Chain – Breach Example
Threat
intelligence
Access/Identity
Endpoint
Network
Delivery Exploitation Installation Actions on Objectives
Attacker hacks website.
Steals .pdf files
Web Portal
Attacker
creates malware,
embed in .pdf
Emails
to the target EMAIL
C2
© 2017 SPLUNK INC.
Kill Chain – Breach Example
Threat
intelligence
Access/Identity
Endpoint
Network
.pdf executes & unpacks malware
overwriting and running “allowed” programs
Delivery Exploitation Installation Actions on Objectives
Svchost.exeCalc.exe
Attacker hacks website.
Steals .pdf files
Web Portal
Attacker
creates malware,
embed in .pdf
Read email, open attachment
Emails
to the target EMAIL
C2
© 2017 SPLUNK INC.
Kill Chain – Breach Example
Threat
intelligence
Access/Identity
Endpoint
Network
.pdf executes & unpacks malware
overwriting and running “allowed” programs
Delivery Exploitation Installation Actions on Objectives
Svchost.exeCalc.exe
Attacker hacks website.
Steals .pdf files
Web Portal
Attacker
creates malware,
embed in .pdf
Read email, open attachment
Emails
to the target EMAIL
HTTP (web) session to
command & control server
Remote control,
Steal data,
Persist in company,
Rent as botnet
WEB
C2
© 2017 SPLUNK INC.
Breach Indicators
© 2017 SPLUNK INC.
© 2017 SPLUNK INC.
That never go away
Advanced
Threats
RECON
WEAPONIZE/DELIVER
EXPLOIT/INSTALLATIONCNC
ACTION
© 2017 SPLUNK INC.
Advanced Threats
Reconnaissance
Ø Web Analytics
Ø Presence of Scanning Tools/Processes
Ø Network/User Enumeration Commands
Ø Scan Traffic across Subnet
Ø Banner Grabbing Events
RECON
WEAPONIZE/DELIVER
EXPLOIT/INSTALLATIO
N
CNC
ACTION
© 2017 SPLUNK INC.
Advanced Threats
Weaponize
Deliver
Exploit
Install
Ø Validated Security Alerts from AV, Anti-Malware
Ø Log Deletion Activities
Ø Change of System Time
Ø Short-Lived/Phantom Users
Ø Presence of Common Processes in Uncommon Locations
Ø Usage of Expired Certificates/Keys in Environment
Ø Re-Enablement/Activity of Disabled Users
RECON
WEAPONIZE/DELIVER
EXPLOIT/INSTALLATIO
N
CNC
ACTION
© 2017 SPLUNK INC.
Advanced Threats
Command
&
Control
Ø Presence of Beaconing Traffic
Ø DNS traffic analysis – Size, frequency, direction, domain
Entropy.
Ø ICMP Traffic analysis
Ø User Agent String Analytics
Ø Similar Page Refresh requests over observable
patterns
Ø User Agents with No Page Referrer
RECON
WEAPONIZE/DELIVER
EXPLOIT/INSTALLATIO
N
CNC
ACTION
© 2017 SPLUNK INC.
Advanced Threats
Action
on
Objectives
Ø Outbound Traffic Analysis (HTTP,DNS,FTP)
Ø Anomalous Data Access by Users
Ø Access at Unusual Time
Ø Access by New Users/Processes
Ø Privilege Escalation on non-admin/New Users
Ø More Recon activities from Pivot Points
Ø DMZ Jumping activities
RECON
WEAPONIZE/DELIVER
EXPLOIT/INSTALLATIO
N
CNC
ACTION
© 2017 SPLUNK INC.
Example Searches
© 2017 SPLUNK INC.
Finding Advanced Threats
Unusual Outbound Activity Using DNS
• What to look for: High number of DNS requests occurring from a particular client compared to baseline
• Why to look for it: Possible advanced threat communication (instruction, stealing data) using DNS protocol
• Data Sources required: DNS logs
• Detection: sourcetype=dns | stats count(clientip) AS Requests by clientip | sort - Requests
Unusual Outbound Activity Using DNS - 2
• What to look for: High number of same-sized DNS requests from an internal host, patterns of same-sized DNS request
• Why to look for it: Possible advanced threat communication (instruction, stealing data) using DNS protocol
• Source data required: DNS logs
• Detection: sourcetype=dns | eval Length=len(query) | stats count(clientip) by Length | sort – Length
Beaconing (Phone Home) to Notify Attacker of Successful Installation
• What to look for: Traffic with periodicity – e.g. traffic to the same URL at the same interval every day
• Why to look for it: Malware trying to establish communication with command and control server to get instructions
• Source data required: DNS or Proxy or Firewall Logs. ‘dest’ could be URL, Domain or IP address
• Detection: ... | streamstats current=f last(_time) as next_time by dest | eval gap = next_time - _time | stats count avg(gap) var(gap) by dest
© 2017 SPLUNK INC.
Finding Advanced Threats
Unusual Outbound Activity Using DNS
• What to look for: High number of DNS requests occurring from a particular client compared to baseline
• Why to look for it: Possible advanced threat communication (instruction, stealing data) using DNS protocol
• Data Sources required: DNS logs
• Detection: sourcetype=dns | stats count(clientip) AS Requests by clientip | sort - Requests
Unusual Outbound Activity Using DNS - 2
• What to look for: High number of same-sized DNS requests from an internal host, patterns of same-sized DNS request
• Why to look for it: Possible advanced threat communication (instruction, stealing data) using DNS protocol
• Source data required: DNS logs
• Detection: sourcetype=dns | eval Length=len(query) | stats count(clientip) by Length | sort – Length
Beaconing (Phone Home) to Notify Attacker of Successful Installation
• What to look for: Traffic with periodicity – e.g. traffic to the same URL at the same interval every day
• Why to look for it: Malware trying to establish communication with command and control server to get instructions
• Source data required: DNS or Proxy or Firewall Logs. ‘dest’ could be URL, Domain or IP address
• Detection: ... | streamstats current=f last(_time) as next_time by dest | eval gap = next_time - _time | stats count avg(gap) var(gap) by dest
© 2017 SPLUNK INC.
Finding Advanced Threats
Unusual Outbound Activity Using DNS
• What to look for: High number of DNS requests occurring from a particular client compared to baseline
• Why to look for it: Possible advanced threat communication (instruction, stealing data) using DNS protocol
• Data Sources required: DNS logs
• Detection: sourcetype=dns | stats count(clientip) AS Requests by clientip | sort - Requests
Unusual Outbound Activity Using DNS - 2
• What to look for: High number of same-sized DNS requests from an internal host, patterns of same-sized DNS request
• Why to look for it: Possible advanced threat communication (instruction, stealing data) using DNS protocol
• Source data required: DNS logs
• Detection: sourcetype=dns | eval Length=len(query) | stats count(clientip) by Length | sort – Length
Beaconing (Phone Home) to Notify Attacker of Successful Installation
• What to look for: Traffic with periodicity – e.g. traffic to the same URL at the same interval every day
• Why to look for it: Malware trying to establish communication with command and control server to get instructions
• Source data required: DNS or Proxy or Firewall Logs. ‘dest’ could be URL, Domain or IP address
• Detection: ... | streamstats current=f last(_time) as next_time by dest | eval gap = next_time - _time | stats count avg(gap) var(gap) by dest
© 2017 SPLUNK INC.
Finding Advanced Threats
Contact to Command and Control Server, Other Malware Sites
• What to look for: Traffic to sites listed as ‘none’ or ‘unknown’ by a reputation service or category filter
• Why to look for it: Attackers often use new or low traffic domains that have not been evaluated by reputation engines
• Data Sources required: Web proxy logs or firewall logs with reputation
• Detection: source=proxy sc_filter_category=None OR sc_filter_ category=unknown| stats count(clientip) by s_hostname, clientip
Malware Delivery and Installation
• What to look for: Fast requests following the download of a portable executable (PDF, Java, .exe, etc.)
• Why to look for it: Indicator of initial exploitation, installation and downloading additional malware/files/instructions
• Source data required: Web proxy or firewall data that includes complete URL or file names
• Detection: source=proxy [search file=*.pdf OR file=*.exe | dedup clientip | table clientip] | transaction maxspan=60s maxpause=5s clientip | eval
Length=len(_raw) | sort –Length
Malware Communicating to Command and Control Server(s)
• What to look for: Traffic to or from blacklisted (internal list, threat intelligence sources) addresses/domains
• Why to look for it: Advanced threat/malware requires on-going communication with adversary to accomplish its objectives
• Source data required: Any log data with IP address or domain name; any data source (log/file) of blacklisted IP or domains
• Detection: source=firewall action=Permit | lookup malicious clientip as dst | stats sum(bytes) by dst
© 2017 SPLUNK INC.
Finding Advanced Threats
Contact to Command and Control Server, Other Malware Sites
• What to look for: Traffic to sites listed as ‘none’ or ‘unknown’ by a reputation service or category filter
• Why to look for it: Attackers often use new or low traffic domains that have not been evaluated by reputation engines
• Data Sources required: Web proxy logs or firewall logs with reputation
• Detection: source=proxy sc_filter_category=None OR sc_filter_ category=unknown| stats count(clientip) by s_hostname, clientip
Malware Delivery and Installation
• What to look for: Fast requests following the download of a portable executable (PDF, Java, .exe, etc.)
• Why to look for it: Indicator of initial exploitation, installation and downloading additional malware/files/instructions
• Source data required: Web proxy or firewall data that includes complete URL or file names
• Detection: source=proxy [search file=*.pdf OR file=*.exe | dedup clientip | table clientip] | transaction maxspan=60s maxpause=5s clientip | eval
Length=len(_raw) | sort –Length
Malware Communicating to Command and Control Server(s)
• What to look for: Traffic to or from blacklisted (internal list, threat intelligence sources) addresses/domains
• Why to look for it: Advanced threat/malware requires on-going communication with adversary to accomplish its objectives
• Source data required: Any log data with IP address or domain name; any data source (log/file) of blacklisted IP or domains
• Detection: source=firewall action=Permit | lookup malicious clientip as dst | stats sum(bytes) by dst
© 2017 SPLUNK INC.
Finding Advanced Threats
Contact to Command and Control Server, Other Malware Sites
• What to look for: Traffic to sites listed as ‘none’ or ‘unknown’ by a reputation service or category filter
• Why to look for it: Attackers often use new or low traffic domains that have not been evaluated by reputation engines
• Data Sources required: Web proxy logs or firewall logs with reputation
• Detection: source=proxy sc_filter_category=None OR sc_filter_ category=unknown| stats count(clientip) by s_hostname, clientip
Malware Delivery and Installation
• What to look for: Fast requests following the download of a portable executable (PDF, Java, .exe, etc.)
• Why to look for it: Indicator of initial exploitation, installation and downloading additional malware/files/instructions
• Source data required: Web proxy or firewall data that includes complete URL or file names
• Detection: source=proxy [search file=*.pdf OR file=*.exe | dedup clientip | table clientip] | transaction maxspan=60s maxpause=5s clientip | eval
Length=len(_raw) | sort –Length
Malware Communicating to Command and Control Server(s)
• What to look for: Traffic to or from blacklisted (internal list, threat intelligence sources) addresses/domains
• Why to look for it: Advanced threat/malware requires on-going communication with adversary to accomplish its objectives
• Source data required: Any log data with IP address or domain name; any data source (log/file) of blacklisted IP or domains
• Detection: source=firewall action=Permit | lookup malicious clientip as dst | stats sum(bytes) by dst
© 2017 SPLUNK INC.
Even after all the Hard work…
© 2017 SPLUNK INC.
Using Data Science
for Detection
© 2017 SPLUNK INC.
Poll Question#4
Do you currently leverage data science & machine learning
capabilities to detect advanced threats?
© 2017 SPLUNK INC.
© 2017 SPLUNK INC.
Data Science: Deriving Some kind of Meaning or Insight from Large Amounts of Data
Machine Learning: “Field of study that gives computers the ability to learn without
being explicitly programmed” – A. Samuel, 1959
© 2017 SPLUNK INC.
© 2017 SPLUNK INC.
What do we do with Data Science & ML?
© 2017 SPLUNK INC.
Core Splunk – Data Science Platform
Find Anomalies
© 2017 SPLUNK INC.
Core Splunk – Data Science Platform
Find Anomalies
© 2017 SPLUNK INC.
Core Splunk – Data Science Platform
Quick Keyword Search
© 2017 SPLUNK INC.
Core Splunk – Data Science Platform
Quick Keyword Search
Quick Keyword Search – With Built-in Data Science
© 2017 SPLUNK INC.
Core Splunk – Data Science Platform
Find Trends & Predict Values
© 2017 SPLUNK INC.
Core Splunk – Data Science Platform
Find Trends & Predict Values
© 2017 SPLUNK INC.
Core Splunk – Data Science Platform
© 2017 SPLUNK INC.
Core Splunk – Data Science Platform
© 2017 SPLUNK INC.
Moving into Machine
Learning…
© 2017 SPLUNK INC.
Advanced Threats
Splunk
Machine Learning
Example: Domain Generation Algorithms aka
DGA
• Legitimate Domain
• dosomething.org
• labtest.edu
• Dynamically Generated Domain for Malware
• b6by4w1s306ed5dlzk2191wq8.org
• bgdjd456ergersy46w4g4y4w7w463tfg234.org
© 2017 SPLUNK INC.
Splunk Machine Learning
Exploring Threats in DNS – The lifeline of Malware Communication
© 2017 SPLUNK INC.
More Data Science – Less Talk
Detecting Outliers in Data Lakes
© 2017 SPLUNK INC.
More Data Science – Less Talk
Detecting Outliers in Data Lakes
© 2017 SPLUNK INC.
Machine Learning References
Additional References for Machine Learning
https://www.udacity.com/course/intro-to-machine-learning--ud120
http://openclassroom.stanford.edu/MainFolder/CoursePage.php?course=MachineLearning
Splunk Machine Learning Toolkit - https://splunkbase.splunk.com/app/2890/
Splunk App for DGA - https://splunkbase.splunk.com/app/3559/
© 2017 SPLUNK INC.
Awesome Splunk Resources
Session Replays from .CONF
http://conf.splunk.com/sessions/2017-sessions.html
© 2017 SPLUNK INC.
Poll Question#5
Which one of the following follow-up discussions on “how you
can leverage security analytics to detect advanced threats in your
environment” are you interested in?
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Thank You

More Related Content

What's hot

Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
Splunk
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
External service interaction
External service interactionExternal service interaction
External service interaction
Pawan Phogat
 
A Threat Hunter Himself
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter Himself
Sergey Soldatov
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
Hostway|HOSTING
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
Splunk
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
Panda Security
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
SKMohamedKasim
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
Sqrrl
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
Splunk
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE - ATT&CKcon
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
Priyanka Aash
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
Teymur Kheirkhabarov
 
Maturity Model of Security Disciplines
Maturity Model of Security Disciplines Maturity Model of Security Disciplines
Maturity Model of Security Disciplines
Florian Roth
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
AlgoSec
 
Windows logging cheat sheet
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheet
Michael Gough
 
Threat Hunting Web Shells Using Splunk
Threat Hunting Web Shells Using SplunkThreat Hunting Web Shells Using Splunk
Threat Hunting Web Shells Using Splunk
jamesmbower
 
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
AlienVault
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
Splunk
 

What's hot (20)

Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
External service interaction
External service interactionExternal service interaction
External service interaction
 
A Threat Hunter Himself
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter Himself
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
 
Maturity Model of Security Disciplines
Maturity Model of Security Disciplines Maturity Model of Security Disciplines
Maturity Model of Security Disciplines
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
Windows logging cheat sheet
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheet
 
Threat Hunting Web Shells Using Splunk
Threat Hunting Web Shells Using SplunkThreat Hunting Web Shells Using Splunk
Threat Hunting Web Shells Using Splunk
 
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 

Similar to Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017

Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
Adam Tice
 
Build a Security Portfolio That Strengthens Your Security Posture
Build a Security Portfolio That Strengthens Your Security PostureBuild a Security Portfolio That Strengthens Your Security Posture
Build a Security Portfolio That Strengthens Your Security Posture
Splunk
 
Analytics-Driven Security - How to Start and Continue the Journey
Analytics-Driven Security - How to Start and Continue the JourneyAnalytics-Driven Security - How to Start and Continue the Journey
Analytics-Driven Security - How to Start and Continue the Journey
Splunk
 
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
Splunk Discovery: Milan 2018 - Intro to Security Analytics MethodsSplunk Discovery: Milan 2018 - Intro to Security Analytics Methods
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
Splunk
 
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
Splunk
 
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarUsing Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Splunk
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
Splunk
 
Machine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into InsightMachine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into Insight
Splunk
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
Fujitsu Middle East
 
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
Splunk
 
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
Splunk
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
Splunk
 
Splunk Forum Frankfurt - 15th Nov 2017 - Threat Hunting
Splunk Forum Frankfurt - 15th Nov 2017 - Threat HuntingSplunk Forum Frankfurt - 15th Nov 2017 - Threat Hunting
Splunk Forum Frankfurt - 15th Nov 2017 - Threat Hunting
Splunk
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
Lancope, Inc.
 
Splunk Data Onboarding Overview - Splunk Data Collection Architecture
Splunk Data Onboarding Overview - Splunk Data Collection ArchitectureSplunk Data Onboarding Overview - Splunk Data Collection Architecture
Splunk Data Onboarding Overview - Splunk Data Collection Architecture
Splunk
 
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk EnterpriseSplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
Splunk
 
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOARPartner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Splunk
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
Spanning Cloud Apps
 
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkReactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Splunk
 
SplunkLive! Paris 2018: Intro to Security Analytics Methods
SplunkLive! Paris 2018: Intro to Security Analytics MethodsSplunkLive! Paris 2018: Intro to Security Analytics Methods
SplunkLive! Paris 2018: Intro to Security Analytics Methods
Splunk
 

Similar to Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017 (20)

Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
 
Build a Security Portfolio That Strengthens Your Security Posture
Build a Security Portfolio That Strengthens Your Security PostureBuild a Security Portfolio That Strengthens Your Security Posture
Build a Security Portfolio That Strengthens Your Security Posture
 
Analytics-Driven Security - How to Start and Continue the Journey
Analytics-Driven Security - How to Start and Continue the JourneyAnalytics-Driven Security - How to Start and Continue the Journey
Analytics-Driven Security - How to Start and Continue the Journey
 
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
Splunk Discovery: Milan 2018 - Intro to Security Analytics MethodsSplunk Discovery: Milan 2018 - Intro to Security Analytics Methods
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
 
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
 
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarUsing Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
 
Machine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into InsightMachine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into Insight
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
 
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
 
Splunk Forum Frankfurt - 15th Nov 2017 - Threat Hunting
Splunk Forum Frankfurt - 15th Nov 2017 - Threat HuntingSplunk Forum Frankfurt - 15th Nov 2017 - Threat Hunting
Splunk Forum Frankfurt - 15th Nov 2017 - Threat Hunting
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Splunk Data Onboarding Overview - Splunk Data Collection Architecture
Splunk Data Onboarding Overview - Splunk Data Collection ArchitectureSplunk Data Onboarding Overview - Splunk Data Collection Architecture
Splunk Data Onboarding Overview - Splunk Data Collection Architecture
 
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk EnterpriseSplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
 
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOARPartner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
 
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkReactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
 
SplunkLive! Paris 2018: Intro to Security Analytics Methods
SplunkLive! Paris 2018: Intro to Security Analytics MethodsSplunkLive! Paris 2018: Intro to Security Analytics Methods
SplunkLive! Paris 2018: Intro to Security Analytics Methods
 

More from Splunk

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
Splunk
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
Splunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
Splunk
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
Splunk
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
Splunk
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
Splunk
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
Splunk
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
Splunk
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
Splunk
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
Splunk
 

More from Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017

  • 1. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Using Splunk to Defend Against Advanced Threats Shailendra Sadh - CISSP | Senior Sales Engineer November 2017
  • 2. © 2017 SPLUNK INC. During the course of this presentation, we may make forward-looking statements regarding future events or the expected performance of the company. We caution you that such statements reflect our current expectations and estimates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward-looking statements, please review our filings with the SEC. The forward-looking statements made in this presentation are being made as of the time and date of its live presentation. If reviewed after its live presentation, this presentation may not contain current or accurate information. We do not assume any obligation to update any forward-looking statements we may make. In addition, any information about our roadmap outlines our general product direction and is subject to change at any time without notice. It is for informational purposes only and shall not be incorporated into any contract or other commitment. Splunk undertakes no obligation either to develop the features or functionality described or to include any such feature or functionality in a future release. Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2017 Splunk Inc. All rights reserved. Forward-Looking Statements
  • 3. © 2017 SPLUNK INC. Agenda ▶ Ideology Behind Defense Mechanism ▶ Overview of Advanced Threats ▶ Breach Indicators ▶ Example Searches ▶ Using Data Science for Detection
  • 4. © 2017 SPLUNK INC. Poll Question#1 What is the most pressing challenge that you currently face in your organization for managing & mitigating advanced threats?
  • 5. © 2017 SPLUNK INC. Why are we here? What we will NOT talk about? What we will talk about?
  • 6. © 2017 SPLUNK INC. Ideology Behind Defense Mechanisms
  • 7. © 2017 SPLUNK INC. Reference -http://www.asianentrepreneur.org/tips-lessons-from-sun-tzus-art-of-war-entrepreneurship/
  • 8. © 2017 SPLUNK INC. Poll Question#2 Do you know/believe that you have visibility across all the data sources & assets across your organization?
  • 9. © 2017 SPLUNK INC. Critical Security Controls Know Yourself
  • 10. © 2017 SPLUNK INC. Critical Security Controls Know Yourself
  • 11. © 2017 SPLUNK INC. Critical Security Controls Know Yourself
  • 13. © 2017 SPLUNK INC. Know Yourself
  • 14. © 2017 SPLUNK INC. But… Who is the enemy…
  • 15. © 2017 SPLUNK INC. Poll Question#3 How confident are you, in your current capabilities to proactively detect & defend against advanced threats possibly targeting your environment?
  • 16. © 2017 SPLUNK INC. Know your Enemy EXPECTATION
  • 17. © 2017 SPLUNK INC. Know your Enemy REALITY Script Kiddie Insider Threat Nation State/Focused Group
  • 18. © 2017 SPLUNK INC. Overview of Advanced Threats
  • 19. © 2017 SPLUNK INC. Definition ADVANCED PERSISTENT THREAT • Adversary can act in Full Spectrum of Intrusion. • Can Utilize publicly available exploits • Or Build his/her own exploits based on target’s Posture. • Formally Tasked to accomplish the Mission. • Not Opportunistic Intruders. • Maintain a level of Interaction to execute their objectives. • Not Just a piece of mindless code wreaking havoc. • Dedicated attackers trying to control the victim, steal the data. • Driven by objective Political, Economical, Competitive Reference - https://taosecurity.blogspot.ae/2010/01/what-is-apt-and-what-does-it-want.html
  • 20. © 2017 SPLUNK INC. Adversary Perspective – Attack Kill Chain Reconnaissance Weaponization Delivery Exploitation Installation Command and Control (C2) Actions on Objectives http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf
  • 21. © 2017 SPLUNK INC. Kill Chain – Breach Example Threat intelligence Access/Identity Endpoint Network Delivery Exploitation Installation Actions on Objectives Attacker hacks website. Steals .pdf files Web Portal C2
  • 22. © 2017 SPLUNK INC. Kill Chain – Breach Example Threat intelligence Access/Identity Endpoint Network Delivery Exploitation Installation Actions on Objectives Attacker hacks website. Steals .pdf files Web Portal Attacker creates malware, embed in .pdf Emails to the target EMAIL C2
  • 23. © 2017 SPLUNK INC. Kill Chain – Breach Example Threat intelligence Access/Identity Endpoint Network .pdf executes & unpacks malware overwriting and running “allowed” programs Delivery Exploitation Installation Actions on Objectives Svchost.exeCalc.exe Attacker hacks website. Steals .pdf files Web Portal Attacker creates malware, embed in .pdf Read email, open attachment Emails to the target EMAIL C2
  • 24. © 2017 SPLUNK INC. Kill Chain – Breach Example Threat intelligence Access/Identity Endpoint Network .pdf executes & unpacks malware overwriting and running “allowed” programs Delivery Exploitation Installation Actions on Objectives Svchost.exeCalc.exe Attacker hacks website. Steals .pdf files Web Portal Attacker creates malware, embed in .pdf Read email, open attachment Emails to the target EMAIL HTTP (web) session to command & control server Remote control, Steal data, Persist in company, Rent as botnet WEB C2
  • 25. © 2017 SPLUNK INC. Breach Indicators
  • 27. © 2017 SPLUNK INC. That never go away Advanced Threats RECON WEAPONIZE/DELIVER EXPLOIT/INSTALLATIONCNC ACTION
  • 28. © 2017 SPLUNK INC. Advanced Threats Reconnaissance Ø Web Analytics Ø Presence of Scanning Tools/Processes Ø Network/User Enumeration Commands Ø Scan Traffic across Subnet Ø Banner Grabbing Events RECON WEAPONIZE/DELIVER EXPLOIT/INSTALLATIO N CNC ACTION
  • 29. © 2017 SPLUNK INC. Advanced Threats Weaponize Deliver Exploit Install Ø Validated Security Alerts from AV, Anti-Malware Ø Log Deletion Activities Ø Change of System Time Ø Short-Lived/Phantom Users Ø Presence of Common Processes in Uncommon Locations Ø Usage of Expired Certificates/Keys in Environment Ø Re-Enablement/Activity of Disabled Users RECON WEAPONIZE/DELIVER EXPLOIT/INSTALLATIO N CNC ACTION
  • 30. © 2017 SPLUNK INC. Advanced Threats Command & Control Ø Presence of Beaconing Traffic Ø DNS traffic analysis – Size, frequency, direction, domain Entropy. Ø ICMP Traffic analysis Ø User Agent String Analytics Ø Similar Page Refresh requests over observable patterns Ø User Agents with No Page Referrer RECON WEAPONIZE/DELIVER EXPLOIT/INSTALLATIO N CNC ACTION
  • 31. © 2017 SPLUNK INC. Advanced Threats Action on Objectives Ø Outbound Traffic Analysis (HTTP,DNS,FTP) Ø Anomalous Data Access by Users Ø Access at Unusual Time Ø Access by New Users/Processes Ø Privilege Escalation on non-admin/New Users Ø More Recon activities from Pivot Points Ø DMZ Jumping activities RECON WEAPONIZE/DELIVER EXPLOIT/INSTALLATIO N CNC ACTION
  • 32. © 2017 SPLUNK INC. Example Searches
  • 33. © 2017 SPLUNK INC. Finding Advanced Threats Unusual Outbound Activity Using DNS • What to look for: High number of DNS requests occurring from a particular client compared to baseline • Why to look for it: Possible advanced threat communication (instruction, stealing data) using DNS protocol • Data Sources required: DNS logs • Detection: sourcetype=dns | stats count(clientip) AS Requests by clientip | sort - Requests Unusual Outbound Activity Using DNS - 2 • What to look for: High number of same-sized DNS requests from an internal host, patterns of same-sized DNS request • Why to look for it: Possible advanced threat communication (instruction, stealing data) using DNS protocol • Source data required: DNS logs • Detection: sourcetype=dns | eval Length=len(query) | stats count(clientip) by Length | sort – Length Beaconing (Phone Home) to Notify Attacker of Successful Installation • What to look for: Traffic with periodicity – e.g. traffic to the same URL at the same interval every day • Why to look for it: Malware trying to establish communication with command and control server to get instructions • Source data required: DNS or Proxy or Firewall Logs. ‘dest’ could be URL, Domain or IP address • Detection: ... | streamstats current=f last(_time) as next_time by dest | eval gap = next_time - _time | stats count avg(gap) var(gap) by dest
  • 34. © 2017 SPLUNK INC. Finding Advanced Threats Unusual Outbound Activity Using DNS • What to look for: High number of DNS requests occurring from a particular client compared to baseline • Why to look for it: Possible advanced threat communication (instruction, stealing data) using DNS protocol • Data Sources required: DNS logs • Detection: sourcetype=dns | stats count(clientip) AS Requests by clientip | sort - Requests Unusual Outbound Activity Using DNS - 2 • What to look for: High number of same-sized DNS requests from an internal host, patterns of same-sized DNS request • Why to look for it: Possible advanced threat communication (instruction, stealing data) using DNS protocol • Source data required: DNS logs • Detection: sourcetype=dns | eval Length=len(query) | stats count(clientip) by Length | sort – Length Beaconing (Phone Home) to Notify Attacker of Successful Installation • What to look for: Traffic with periodicity – e.g. traffic to the same URL at the same interval every day • Why to look for it: Malware trying to establish communication with command and control server to get instructions • Source data required: DNS or Proxy or Firewall Logs. ‘dest’ could be URL, Domain or IP address • Detection: ... | streamstats current=f last(_time) as next_time by dest | eval gap = next_time - _time | stats count avg(gap) var(gap) by dest
  • 35. © 2017 SPLUNK INC. Finding Advanced Threats Unusual Outbound Activity Using DNS • What to look for: High number of DNS requests occurring from a particular client compared to baseline • Why to look for it: Possible advanced threat communication (instruction, stealing data) using DNS protocol • Data Sources required: DNS logs • Detection: sourcetype=dns | stats count(clientip) AS Requests by clientip | sort - Requests Unusual Outbound Activity Using DNS - 2 • What to look for: High number of same-sized DNS requests from an internal host, patterns of same-sized DNS request • Why to look for it: Possible advanced threat communication (instruction, stealing data) using DNS protocol • Source data required: DNS logs • Detection: sourcetype=dns | eval Length=len(query) | stats count(clientip) by Length | sort – Length Beaconing (Phone Home) to Notify Attacker of Successful Installation • What to look for: Traffic with periodicity – e.g. traffic to the same URL at the same interval every day • Why to look for it: Malware trying to establish communication with command and control server to get instructions • Source data required: DNS or Proxy or Firewall Logs. ‘dest’ could be URL, Domain or IP address • Detection: ... | streamstats current=f last(_time) as next_time by dest | eval gap = next_time - _time | stats count avg(gap) var(gap) by dest
  • 36. © 2017 SPLUNK INC. Finding Advanced Threats Contact to Command and Control Server, Other Malware Sites • What to look for: Traffic to sites listed as ‘none’ or ‘unknown’ by a reputation service or category filter • Why to look for it: Attackers often use new or low traffic domains that have not been evaluated by reputation engines • Data Sources required: Web proxy logs or firewall logs with reputation • Detection: source=proxy sc_filter_category=None OR sc_filter_ category=unknown| stats count(clientip) by s_hostname, clientip Malware Delivery and Installation • What to look for: Fast requests following the download of a portable executable (PDF, Java, .exe, etc.) • Why to look for it: Indicator of initial exploitation, installation and downloading additional malware/files/instructions • Source data required: Web proxy or firewall data that includes complete URL or file names • Detection: source=proxy [search file=*.pdf OR file=*.exe | dedup clientip | table clientip] | transaction maxspan=60s maxpause=5s clientip | eval Length=len(_raw) | sort –Length Malware Communicating to Command and Control Server(s) • What to look for: Traffic to or from blacklisted (internal list, threat intelligence sources) addresses/domains • Why to look for it: Advanced threat/malware requires on-going communication with adversary to accomplish its objectives • Source data required: Any log data with IP address or domain name; any data source (log/file) of blacklisted IP or domains • Detection: source=firewall action=Permit | lookup malicious clientip as dst | stats sum(bytes) by dst
  • 37. © 2017 SPLUNK INC. Finding Advanced Threats Contact to Command and Control Server, Other Malware Sites • What to look for: Traffic to sites listed as ‘none’ or ‘unknown’ by a reputation service or category filter • Why to look for it: Attackers often use new or low traffic domains that have not been evaluated by reputation engines • Data Sources required: Web proxy logs or firewall logs with reputation • Detection: source=proxy sc_filter_category=None OR sc_filter_ category=unknown| stats count(clientip) by s_hostname, clientip Malware Delivery and Installation • What to look for: Fast requests following the download of a portable executable (PDF, Java, .exe, etc.) • Why to look for it: Indicator of initial exploitation, installation and downloading additional malware/files/instructions • Source data required: Web proxy or firewall data that includes complete URL or file names • Detection: source=proxy [search file=*.pdf OR file=*.exe | dedup clientip | table clientip] | transaction maxspan=60s maxpause=5s clientip | eval Length=len(_raw) | sort –Length Malware Communicating to Command and Control Server(s) • What to look for: Traffic to or from blacklisted (internal list, threat intelligence sources) addresses/domains • Why to look for it: Advanced threat/malware requires on-going communication with adversary to accomplish its objectives • Source data required: Any log data with IP address or domain name; any data source (log/file) of blacklisted IP or domains • Detection: source=firewall action=Permit | lookup malicious clientip as dst | stats sum(bytes) by dst
  • 38. © 2017 SPLUNK INC. Finding Advanced Threats Contact to Command and Control Server, Other Malware Sites • What to look for: Traffic to sites listed as ‘none’ or ‘unknown’ by a reputation service or category filter • Why to look for it: Attackers often use new or low traffic domains that have not been evaluated by reputation engines • Data Sources required: Web proxy logs or firewall logs with reputation • Detection: source=proxy sc_filter_category=None OR sc_filter_ category=unknown| stats count(clientip) by s_hostname, clientip Malware Delivery and Installation • What to look for: Fast requests following the download of a portable executable (PDF, Java, .exe, etc.) • Why to look for it: Indicator of initial exploitation, installation and downloading additional malware/files/instructions • Source data required: Web proxy or firewall data that includes complete URL or file names • Detection: source=proxy [search file=*.pdf OR file=*.exe | dedup clientip | table clientip] | transaction maxspan=60s maxpause=5s clientip | eval Length=len(_raw) | sort –Length Malware Communicating to Command and Control Server(s) • What to look for: Traffic to or from blacklisted (internal list, threat intelligence sources) addresses/domains • Why to look for it: Advanced threat/malware requires on-going communication with adversary to accomplish its objectives • Source data required: Any log data with IP address or domain name; any data source (log/file) of blacklisted IP or domains • Detection: source=firewall action=Permit | lookup malicious clientip as dst | stats sum(bytes) by dst
  • 39. © 2017 SPLUNK INC. Even after all the Hard work…
  • 40. © 2017 SPLUNK INC. Using Data Science for Detection
  • 41. © 2017 SPLUNK INC. Poll Question#4 Do you currently leverage data science & machine learning capabilities to detect advanced threats?
  • 43. © 2017 SPLUNK INC. Data Science: Deriving Some kind of Meaning or Insight from Large Amounts of Data Machine Learning: “Field of study that gives computers the ability to learn without being explicitly programmed” – A. Samuel, 1959
  • 45. © 2017 SPLUNK INC. What do we do with Data Science & ML?
  • 46. © 2017 SPLUNK INC. Core Splunk – Data Science Platform Find Anomalies
  • 47. © 2017 SPLUNK INC. Core Splunk – Data Science Platform Find Anomalies
  • 48. © 2017 SPLUNK INC. Core Splunk – Data Science Platform Quick Keyword Search
  • 49. © 2017 SPLUNK INC. Core Splunk – Data Science Platform Quick Keyword Search Quick Keyword Search – With Built-in Data Science
  • 50. © 2017 SPLUNK INC. Core Splunk – Data Science Platform Find Trends & Predict Values
  • 51. © 2017 SPLUNK INC. Core Splunk – Data Science Platform Find Trends & Predict Values
  • 52. © 2017 SPLUNK INC. Core Splunk – Data Science Platform
  • 53. © 2017 SPLUNK INC. Core Splunk – Data Science Platform
  • 54. © 2017 SPLUNK INC. Moving into Machine Learning…
  • 55. © 2017 SPLUNK INC. Advanced Threats Splunk Machine Learning Example: Domain Generation Algorithms aka DGA • Legitimate Domain • dosomething.org • labtest.edu • Dynamically Generated Domain for Malware • b6by4w1s306ed5dlzk2191wq8.org • bgdjd456ergersy46w4g4y4w7w463tfg234.org
  • 56. © 2017 SPLUNK INC. Splunk Machine Learning Exploring Threats in DNS – The lifeline of Malware Communication
  • 57. © 2017 SPLUNK INC. More Data Science – Less Talk Detecting Outliers in Data Lakes
  • 58. © 2017 SPLUNK INC. More Data Science – Less Talk Detecting Outliers in Data Lakes
  • 59. © 2017 SPLUNK INC. Machine Learning References Additional References for Machine Learning https://www.udacity.com/course/intro-to-machine-learning--ud120 http://openclassroom.stanford.edu/MainFolder/CoursePage.php?course=MachineLearning Splunk Machine Learning Toolkit - https://splunkbase.splunk.com/app/2890/ Splunk App for DGA - https://splunkbase.splunk.com/app/3559/
  • 60. © 2017 SPLUNK INC. Awesome Splunk Resources Session Replays from .CONF http://conf.splunk.com/sessions/2017-sessions.html
  • 61. © 2017 SPLUNK INC. Poll Question#5 Which one of the following follow-up discussions on “how you can leverage security analytics to detect advanced threats in your environment” are you interested in?
  • 62. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Thank You