Splunk Search

Help with multiple time-frame searches...

jambajuice
Communicator

I'm looking to create a large number of searches that will identify suspicious security events. An example of the logic would be as follows:

If the number of failed logins from src_ip in the first minute is > 3, set priority to 2. If the number of failed logins from src_ip in the first 3 minutes is > 100, set priority to 5. If the number of failed logins from src_ip in the first to minutes is > 1000, set priority to 9.

This kind of logic would capture a brute force login attack with increasing confidence.

What is the best way to implement something like this without having to schedule hundreds of searches (assuming you want to monitor a large variety of suspicious events)? I've been experimenting with a search like this:

host="192.168.198.1" earliest=-5m [search * earliest=-5m latest=-4m | stats count by src_ip,dest_ip,dest_port | rename count AS count1] | stats count by src_ip,dest_ip,dest_port | table src_ip,dest_ip,dest_port,count1,count

This search ran for a very, very long time. Far longer than the 5 minutes it was looking at. Would a better approach be to run saved searches that collect stats on the events in question and save them to either a lookup table or summary index for use by other searches that would apply the logic?

Is it possible to run a search with a latest= value that is in the future? I can see implementing something like this: A search runs every minute and checks the event id against a lookup table to see if that event triggers a more complex search. If so, it returns the search string. If there is a match, the event is piped to the search string returned from the lookup table with a latest= value x minutes into the future. That search would run until the latest= value is met and then use eval or stats to apply the logical tests. Ideally that final search could be sent to the background so the next event with a positive match in the lookup table can be processed.

Any help is appreciated.

Craig

Tags (1)
0 Karma

gkanapathy
Splunk Employee
Splunk Employee

Something like:

earliest=-5m "failed login" 
| timechart count by src_ip 
| eval minsago=floor((now()-_time)/60) 
| lookup threshold_table minsago OUTPUT threshold priority
| where count > threshold
| stats max(priority) as priority by src_ip

And threshold table as:

minsago,threshold,priority
0,3,2
2,100,5
4,1000,9

seems like it would fit the textual description.

As far as time range, yes you can search for events in the future, but it sounds more like you really want to use real-time searches (or real-time alerts once 4.2 is out)


Update: You can just add in a streamstats command to get the cumulative count:

earliest=-5m "failed login" 
| bucket _time span=1m
| stats count by _time,src_ip
| sort + _time
| streamstats current=t window=0 global=f
     sum(count) as count by src_ip
| eval minsago=floor((now()-_time)/60) 
| lookup threshold_table minsago OUTPUT threshold priority
| where count > threshold
| stats max(priority) as priority by src_ip
0 Karma

gkanapathy
Splunk Employee
Splunk Employee

actually, i guess using timechart won't quite work. i rewrote it using stats instead.

0 Karma

gkanapathy
Splunk Employee
Splunk Employee

add the streamstats command as in the update above to accumulate the sum.

0 Karma

jambajuice
Communicator

Even though in minsago=4, there were only 25 events during that minute? How can I sum the events from the time window defined by the earliest _time + minsago?

0 Karma

jambajuice
Communicator

First off, I want to thank you and all the other folks who have answered my slews of questions. The Splunk community is incredibly supportive!

Does the "where count > threshold" command add up the contents of the preceding minutes? Let's say the failed login count looks like the following (minsago,src_ip,count):

0,192.168.1.1,4
1,192.168.1.1,25

2,192.168.1.1,30

3,192.168.1.1,1100

4,192.168.1.1,25

5,192.168.1.1,11

If the count of events crosses the threshold at minsago=3, will that search show that at the end of minsago=4 the count of events was 1159?

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...