Getting Data In

How do you use NetFlow to detect traffic spikes over a 10 min window by src_ip?

honey4sec
Explorer

Hi,

I am currently trying to create a search that looks at NetFlow data from all our hosts using a specified port 389

The value(traffic) is not fixed as some of our hosts have a normal hight chattiness using LDAP.

So my problem is that I haven't figured out how to create a search that's able to find the spikes in traffic.

What i do is trying to count packets, and say if the volume is doubled within the timewindow of 10 minutes, create an alert for that one host(src_ip)

Any tips or tricks?

I did try creating a search using moving average but the visual representation was all mumbled using timechart.

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...