Splunk Enterprise

Suricata search- How to identify a false positive or false negative?

Jorgelopes
New Member

Hello all

Very new to splunk

Currently analyzing the old botsv1, and its very interesting so far.

I'm stuck when analyzing suricata logs

First of all, how to identify a false positive or false negative?

Second how to identify from the signatures that identified a ransomware which one did actually detected the ransomware.

Thank you all for you comments.

Thank you

Labels (2)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

It sounds like you need to understand the Suricata logs - have you tried the Suricata documentation or website or community pages?

0 Karma

Jorgelopes
New Member

I did had a look at the output of the logs.

What I still don't understand is that if you have 5 events (alert) with severity=1.

How can any of those 5 be a false positive.

 

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...