Splunk Enterprise

Suricata search- How to identify a false positive or false negative?

Jorgelopes
New Member

Hello all

Very new to splunk

Currently analyzing the old botsv1, and its very interesting so far.

I'm stuck when analyzing suricata logs

First of all, how to identify a false positive or false negative?

Second how to identify from the signatures that identified a ransomware which one did actually detected the ransomware.

Thank you all for you comments.

Thank you

Labels (2)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

It sounds like you need to understand the Suricata logs - have you tried the Suricata documentation or website or community pages?

0 Karma

Jorgelopes
New Member

I did had a look at the output of the logs.

What I still don't understand is that if you have 5 events (alert) with severity=1.

How can any of those 5 be a false positive.

 

0 Karma
Get Updates on the Splunk Community!

Splunk Observability Cloud's AI Assistant in Action Series: Auditing Compliance and ...

This is the third post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how to ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

What You Read The Most: Splunk Lantern’s Most Popular Articles!

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...