Splunk Enterprise

Suricata search- How to identify a false positive or false negative?

Jorgelopes
New Member

Hello all

Very new to splunk

Currently analyzing the old botsv1, and its very interesting so far.

I'm stuck when analyzing suricata logs

First of all, how to identify a false positive or false negative?

Second how to identify from the signatures that identified a ransomware which one did actually detected the ransomware.

Thank you all for you comments.

Thank you

Labels (2)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

It sounds like you need to understand the Suricata logs - have you tried the Suricata documentation or website or community pages?

0 Karma

Jorgelopes
New Member

I did had a look at the output of the logs.

What I still don't understand is that if you have 5 events (alert) with severity=1.

How can any of those 5 be a false positive.

 

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...