Knowledge Management

Suricata/Bro Data Models

ddecker03
Loves-to-Learn Everything

So I am getting data ingested from Bro/Zeek and Suricata via the TA's for said applications. I want to build data models for them and wanted to see if anyone has anything built for Bro/Zeek or Suricata.

So far I built a "data model" for suricata (called suricata)

Then a Root Event (index=suricata source=suricata sourcetype=suricata)
From there I have Child
Src_ip (src_ip=192.168.*)
Then children of that are broken out like this
--Severity
------Severity I (suricata.attack.severity=1)
------Severity II (suricata.attack.severity=2)
------Severity III(suricata.attack.severity=3)
--Category

Dest_ip

Well you get the point.

Is there a better way of doing this, or am I on sort of the right track?

0 Karma
Get Updates on the Splunk Community!

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...

What’s New in Splunk Observability Cloud: January Feature Highlights & Deep Dives

Splunk Observability Cloud continues to evolve, empowering engineering and operations teams with advanced ...