<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using Splunk to analyze firewalls, how can I detect attackers who are doing IP spoofing attacks? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Using-Splunk-to-analyze-firewalls-how-can-I-detect-attackers-who/m-p/447880#M126938</link>
    <description>&lt;P&gt;The aim here is to use Splunk to analyse firewalls.&lt;BR /&gt;
The requirement is to use Splunk to see if any IP spoofing attacks have occurred.&lt;BR /&gt;
Using index=checkpoint-opsec I am able to, for example, analyse the logs but which value in Checkpoint\ Juniper represents a spoofing attack or drop due to anti-spoofing on the firewall?&lt;/P&gt;</description>
    <pubDate>Thu, 07 Feb 2019 11:23:56 GMT</pubDate>
    <dc:creator>btb2018</dc:creator>
    <dc:date>2019-02-07T11:23:56Z</dc:date>
    <item>
      <title>Using Splunk to analyze firewalls, how can I detect attackers who are doing IP spoofing attacks?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-Splunk-to-analyze-firewalls-how-can-I-detect-attackers-who/m-p/447879#M126937</link>
      <description>&lt;P&gt;How can I detect attackers using IP spoofing in Splunk?&lt;/P&gt;

&lt;P&gt;I want to be able to detect this in Checkpoint and Juniper firewalls.&lt;/P&gt;

&lt;P&gt;I presume a standard search operation would work, but how is anti-spoofing reported?&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 11:04:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-Splunk-to-analyze-firewalls-how-can-I-detect-attackers-who/m-p/447879#M126937</guid>
      <dc:creator>btb2018</dc:creator>
      <dc:date>2019-02-07T11:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: Using Splunk to analyze firewalls, how can I detect attackers who are doing IP spoofing attacks?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-Splunk-to-analyze-firewalls-how-can-I-detect-attackers-who/m-p/447880#M126938</link>
      <description>&lt;P&gt;The aim here is to use Splunk to analyse firewalls.&lt;BR /&gt;
The requirement is to use Splunk to see if any IP spoofing attacks have occurred.&lt;BR /&gt;
Using index=checkpoint-opsec I am able to, for example, analyse the logs but which value in Checkpoint\ Juniper represents a spoofing attack or drop due to anti-spoofing on the firewall?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 11:23:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-Splunk-to-analyze-firewalls-how-can-I-detect-attackers-who/m-p/447880#M126938</guid>
      <dc:creator>btb2018</dc:creator>
      <dc:date>2019-02-07T11:23:56Z</dc:date>
    </item>
    <item>
      <title>Re: Using Splunk to analyze firewalls, how can I detect attackers who are doing IP spoofing attacks?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Using-Splunk-to-analyze-firewalls-how-can-I-detect-attackers-who/m-p/447881#M126939</link>
      <description>&lt;P&gt;I do not have Checkpoint experience, but here is info from Checkpoint's website:&lt;BR /&gt;
Logs shows that traffic is dropped with "message_info: Address spoofing" in the "Information" field.&lt;BR /&gt;
These logs appear for inbound packets on the external interface of Security Gateway, although these packets were received from the network that belongs to the same external interface.&lt;/P&gt;

&lt;P&gt;Search for the action in the messages that match above&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 14:52:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Using-Splunk-to-analyze-firewalls-how-can-I-detect-attackers-who/m-p/447881#M126939</guid>
      <dc:creator>mydog8it</dc:creator>
      <dc:date>2019-02-07T14:52:26Z</dc:date>
    </item>
  </channel>
</rss>

