Alerting

Detect Anomaly in User Login Logs

binitshrestha
Explorer

Hello Splunk team and community,

I am working with the Splunk Machine Learning (ML) toolkit to detect anomalies in product logs. Particularly, I have logs in Splunk that contain usernames and cities the user has logged in from. Is there any way I can use ML, or any other methods in Splunk, to detect anomalous login locations for a particular user by analyzing the history of that user's logins?

The logs I have contain hundreds of different users, so this alert would need to map each user with their login locations and detect any anomalous cities from their history of locations. If anyone has any ideas, tips, or guidance, I will be very grateful!

Thanks!
Binit

0 Karma

hagjos43
Contributor

Not sure if this will do the trick for you or not, but there are two queries posted on GoSplunk that might help! It's not going to get exactly what you want, but may point you in the right direction.

  1. https://gosplunk.com/detect-username-guessing-brute-force-attacks/
  2. https://gosplunk.com/compare-successful-internal-vs-external-connections/
0 Karma
Get Updates on the Splunk Community!

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...

Share Your Ideas & Meet the Lantern team at .Conf! Plus All of This Month’s New ...

Splunk Lantern is Splunk’s customer success center that provides advice from Splunk experts on valuable data ...