Splunk Enterprise Security

Need help to update "Notable -Substantial Increase In Port Activity" to establish a base line for each destination port

kamal_jagga
Contributor

We have not been using the Splunk ES for long and the “xswhere” used for this notable is an extreme search. The extreme search provides a non-fixed threshold on when to alert, but it needs time to first baseline. During this time, this correlation rule may be very active in creating notables, as it has yet to establish a base line for each destination port.
Current Search:

| tstats allow_old_summaries=true count,values(All_Traffic.tag) as tag from datamodel=Network_Traffic.All_Traffic where nodename=All_Traffic.Traffic_By_Source.LAN_Traffic by All_Traffic.dest_port
| drop_dm_object_name("All_Traffic")
| xswhere count from count_by_dest_port_1d in network_traffic by dest_port is extreme

I tried to remove some of the ips of the known devices to reduce the count by updating the query.

| tstats allow_old_summaries=true count,values(All_Traffic.tag) as tag, values(All_Traffic.src_ip) as src_ip from datamodel=Network_Traffic.All_Traffic where nodename=All_Traffic.Traffic_By_Source.LAN_Traffic by All_Traffic.dest_port
| lookup test_exclude.csv ip as src_ip outputnew ip as ip
| where src_ip!=ip

| drop_dm_object_name("All_Traffic")
| xswhere count from count_by_dest_port_1d in network_traffic by dest_port is extreme

And also I know we can check the current threshold level for this using extreme search but I am unable to do that. And update the query in some way.

But I am not sure about it.

Kindly advise.

0 Karma

gf13579
Communicator

And also I know we can check the current threshold level for this using extreme search

| inputlookup network_traffic.context.csv 
| table class,concept,center,count,domainMax,domainMin,points,size,type

Add this to look at a given port:

| search class=9571 

Check the 3 pipe-separated values in points, per concept, e.g.:

extreme    5|10|15

jcoates
Communicator

Hi, this has a backing context generation search that you should review: Network - Port Activity By Destination Port - Context Gen.

I also recommend getting the Extreme Search Visualization app, which has tools for visually reviewing contexts and more documentation. https://splunkbase.splunk.com/app/2855/

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...