0% found this document useful (0 votes)
170 views

Using Splunk User Behavior Analytics

Using Splunk Behavior Analytics, white paper

Uploaded by

Daniel GlezPer
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
170 views

Using Splunk User Behavior Analytics

Using Splunk Behavior Analytics, white paper

Uploaded by

Daniel GlezPer
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

TECH BRIEF

USING SPLUNK USER BEHAVIOR ANALYTICS


Automating early breach detection and continuous threat monitoring

Automated Early Breach Detection • Lateral movement

Cyberattacks are sophisticated and it’s difficult • Suspicious behavior


to find hidden threats early—yet early detection • Data exfiltration and IP theft
is critical to preventing the loss of confidential
and sensitive enterprise and customer data. Specifically, Splunk UBA analyzes events collected
in Splunk Enterprise and then performs behavior
While sophisticated threats like APTs and insider
baselining, peer group analytics, clustering, graph
attacks hide within the enterprise, indications
walks and other techniques to find hidden threats
of breaches can be gleaned by analyzing
by identifying and stitching anomalies together,
data. Locating a breach requires advanced
for example:
detection methods such as finding dynamic and
polymorphic threat patterns and identifying • Remote account takeover

behavior of threat actors over weeks, months • Suspicious behavior


and even years.
• Malware activity

Splunk Enterprise deployments contain a wealth • Data exfiltration by compromised account


of security data that has information about • Data exfiltration by malware
threats. Because Splunk Enterprise aggregates
• Lateral movement by insider
and analyzes machine data for Operational
Intelligence, it contains data that’s sprinkled with • Compromised account

the signals that indicate hidden threats, including • Infected device


key context that points to a breach.
• Fraudulent website activity

Splunk User Behavior Analytics (Splunk UBA)


extends the Splunk platform by creating multi- Data Sources
dimensional behavior baselines around users, Splunk UBA provides machine learning driven
service accounts, devices and applications, and correlation of anomalies across multiple data
then executing unsupervised machine learning sources, which can include security products
algorithms to generate anomalies and threats. or services such as firewalls, web gateways,
Splunk UBA works in conjunction with Splunk VPN technologies, endpoint solutions, DLP
Enterprise and Splunk Enterprise Security products, cloud applications, networking devices
(Splunk ES) to automate the detection of: and essentially any infrastructure within the

• Malware and insider threats environment that generates machine data.

• Account compromise and privileged account


abuse
TECH BRIEF

Examples of Data Sources


Identity and Privileged User Activity: entity ID
and authentication events (Active Directory,
single sign-on, VPN, etc.), and privileged account
management applications

Activity: HTTP transactions, intra-network activities


(firewall, web gateway, proxy, DPL, etc.)

SIEM: Splunk ES or third party log management


products (HP/ArcSight, LogRhythm, IBM/QRadar, etc.)

Hadoop Ecosystem: existing Hadoop data


repositories (Cloudera, Hortonworks, etc.)

Malware Detection: existing sandbox or dynamic


analysis products (FireEye, Palo Alto Wildfire, etc.)

External Threat Feeds: FS-ISAC, Collective Intelligence Splunk UBA adds automation to either a standalone
Framework (CIF), etc. enterprise deployment or an enterprise security
deployment. In an enterprise security deployment, it
Cloud Applications: AWS CloudTrail, Box,
automatically pushes threat information into Splunk
Office 365, etc.
ES, which then becomes a notable event. Threats
Endpoint: application and security logs from laptops, discovered by Splunk UBA will be taken into account
desktops and servers or third party endpoint solutions as part of the risk scoring algorithms within Splunk
ES. This enables Splunk Enterprise Security users
Custom Apps: live event streaming via JavaScript, to continue leveraging the Splunk ES Risk Scoring
Java, REST, Syslog Framework and Splunk ES Incident Review workflow
for threat management. In addition, all Splunk UBA
Automated Continuous Threat Monitoring anomalies are also fed into Splunk ES for additional
Splunk UBA visualizes threats along the kill chain insight. This combined solution offers prevention,
and provides supporting evidence so that the detection and response capabilities.
security analyst can take immediate action based
on a prioritized list of significant threats to
investigate. This approach avoids overloading the
analyst with alerts and false positives.

Analytics-based workflow enables a hunter to


investigate anomalies and look for policy violations
or potential intent to exfiltrate data.

Download Splunk for free or get started with the free cloud trial. Whether cloud, on-premises, or for large or small teams,
Splunk has a deployment model that will fit your needs.

Learn more: www.splunk.com/asksales www.splunk.com

© 2017 Splunk Inc. All rights reserved. Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light
and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,
product names, or trademarks belong to their respective owners. TB-Splunk-UBA-103

You might also like