Anomaly Mining in Windows Event Logs in Splunk
Anomaly Mining in Windows Event Logs in Splunk
expected financial performance of our company, including our expectations regarding our products,
technology, strategy, customers, markets, acquisitions and investments. These statements reflect
Looking management’s current expectations, estimates and assumptions based on the information currently
available to us. These forward-looking statements are not guarantees of future performance and involve
significant risks, uncertainties
involve significant and other
risks, uncertainties factors
and other that maythat
factors cause
mayour actual
cause ourresults, performance or
actual results,
Statements achievements
performance ortoachievements
by
be materially different
the forward-looking
expressed or implied bystatements
from results,
to be materially
containedstatements
the forward-looking
performance
different
in this presentation.
or achievements
from results, performance orexpressed
contained in this presentation.
or implied
achievements
For additional information about factors that could cause actual results to differ materially from those
described in the forward-looking statements made in this presentation, please refer to our periodic
reports and other filings with the SEC, including the risk factors identified in our most recent quarterly
reports on Form 10-Q and annual reports on Form 10-K, copies of which may be obtained by visiting the
Splunk Investor
the Splunk Relations
Investor website
Relations at www.investors.splunk.com
website at www.investors.splunk.com or the
or SEC's website
the SEC's at www.sec.gov.
website at
The forward-looking
www.sec.gov. statements made
The forward-looking in this presentation
statements made in thisare made as ofare
presentation themade
time and
as ofdate of this
the time and
presentation. If reviewed after
date of this presentation. the initial
If reviewed presentation,
after even if made
the initial presentation, available
even if madebyavailable
us, on ourbywebsite or
us, on our
otherwise,
website or itotherwise,
may not contain
it may notcurrent or accurate
contain current orinformation. We disclaim
accurate information. Weany obligation
disclaim anyto update or
obligation to
revise
updateany forward-looking
or revise statement statement
any forward-looking based on newbased information, future events
on new information, or otherwise,
future except as
events or otherwise,
required
except asbyrequired
applicable law.
by applicable law.
In addition, any information about our roadmap outlines our general product direction and is subject to
change at any time without notice. It is for informational purposes only and shall not be incorporated into
any contract
into any or other
contract commitment.
or other We undertake
commitment. no obligation
We undertake either
no obligation to develop
either the features
to develop or or
the features
functionalities described or to include any such feature or functionality in a future release.
Splunk, Splunk>, Data-to-Everything, D2E and Turn Data Into Doing are trademarks and registered trademarks of Splunk Inc. in the United States and other
countries. All other
other countries. brandbrand
All other names, product
names, namesnames
product or trademarks belongbelong
or trademarks to theirtorespective owners.
their respective © 2021
owners. © Splunk Inc. AllInc.
2021 Splunk rights reserved.
All rights reserved.
© 2021 SPLUNK INC.
Anomaly
Mining in
Windows
Event Logs
SEC1395A
Efi Kaufman
Cyber Security Center | Israel Ministry of Energy
Dr Greg Ainslie-Malik
Principal Product Manager | Splunk
© 2021 SPLUNK INC.
3) Demo time!
Sit back and relax...
4) What’s next?
Other considerations for making our analytics operational
© 2021 SPLUNK INC.
Rule based approaches ML isn’t magic, but it can You can find some
have a place as much as be a useful tool interesting stuff by hunting
ML through your logs
© 2021 SPLUNK INC.
Rules will be used to search for known Indicators of Compromise (IoC), well known but generic attack
patterns and in more mature and advanced implementation will leverage data from MITRE ATT&CK
framework to be able to pinpoint specific threats and attacks.
© 2021 SPLUNK INC.
“Many of the rules and policies organizations currently have in place are ineffective.
CardinalOps research data shows that an average of 25% of SIEM rules are broken and
will never fire, primarily due to fields that are not extracted correctly or log sources that are not
sending the required data. However, organizations are completely unaware that these rules are
not functioning. Additionally, only 15% of SIEM rules lead to 95% of the tickets handled by
the Security Operations Center (SOC), demonstrating that a small percentage of noisy rules
overwhelm SOC analysts with distracting false positive (FP) alerts.”
CARDINALOPS Research -
https://www.securitymagazine.com/articles/94556-enterprise-siems-unprepared-for-84-of-mitre-attck-tactics-and-techniques
© 2021 SPLUNK INC.
Statistics
based
analytics
Problem specifics
How can we programmatically find unusual windows events in our environment?
We have 1000’s of users, event codes and Many of the outliers we spotted during the
hosts in the data, making millions of initial analysis sat in close proximity to
permutations ‘normal’ events
So what? So what?
The fit command in the MLTK disregards Clustering techniques such as KMeans
categorical fields that have over 100 values, aren’t sensitive to these types of scenarios
one-hot-encoding those with less than 100
values
© 2021 SPLUNK INC.
KMeans DBSCAN
© 2021 SPLUNK INC.
Caveats
Anomaly detection (not always) equals threat detection
?
© 2021 SPLUNK INC.
App Demo
Testing our
app against
the BOTS
dataset
(anyone for guess the version?)
© 2021 SPLUNK INC.
What’s next
Operationalize our method
1) Decide what other data sources are going to be used (Windows events, firewall, IDS logs )
2) Review your data (garbage in-garbage out)
3) Determine the X-axis time interval (Hourly,daily ?)
4) Automate KV store lookup
5) Fine tune min. sample size and distance parameters
6) Create alerts
© 2021 SPLUNK INC.
What else?
Where else could you mine your data for anomalies?
IT Customer
Operations IT Security OT Security Fraud Experience
SESSION SURVEY