While working with customers over the years, I've noticed a pattern with questions they have around operationalizing machine learning: “How can I use Machine Learning (ML) for threat detection with my data?”, “What are the best practices around model re-training and updates?”, and “Am I going to need to hire a data scientist to support this workflow in my security operations center (SOC)?”
Well, we are excited to announce that the SplunkWorks team launched a new community-supported add-on to help answer these questions – and more. The Machine Learning Cloud Service Add-on for Enterprise Security (ES) extends the core capabilities of Splunk ES with new machine learning functionality.
These are challenging obstacles for any organization with a limited data science background and the Add-on addresses these challenges directly through automation and innovations from Splunk’s field machine learning team. Over the past 3 years, the popularity of the DGA analysis app has been a valuable educational tool for learning how to develop ML use cases in the Splunk Platform. The challenge faced by many customers who adopt this app is having enough expertise and experience with DGA detection to be able to customize the app into an operational workflow that meets the following requirements:
These key requirements are provided out of the box by the Add-On to accelerate your journey to leveraging ML as part of your SOC workflows. The app ships with pre-trained machine learning models that can detect DGA generated domains found in your DNS data. These machine learning models are updated automatically through two different approaches:
This approach allows a customer to have access to continuously improving machine learning models based on the latest threat intelligence and personalize the models to suit the needs of their particular industry. An added benefit to the way we’ve configured the algorithm used for detecting DGA domains is the ability to tune out low confidence predictions and adjust the risk score associated with these notable events. Risk-based alerting and reporting automatically implemented based on the model’s confidence score and can be used by customers to provide a wider context of an entity’s behavior.
The capabilities in this add-on can be leveraged alongside your current ES and User Behavior Analytics (UBA) deployment. The add-on is designed to complement both solutions, allowing your security operations team to detect ransomware or botnet behaviors using supervised machine learning.
Product |
Machine Learning Type |
Use Case |
Splunk Enterprise Security (ES) & Splunk User Behavior Analytics (UBA) |
Unsupervised Anomaly Detection |
Security Analytics focused on baselining behaviors to identify threats such as anomalous logins, data exfiltration, and network reconnaissance |
Supervised Classification |
Security Analytics focused on predicting if a behavior is associated with ransomware or botnet |
The Add-on is free for existing Splunk ES customers on Splunk Enterprise 8.0 and Enterprise Security 6.0 and can be downloaded from Splunkbase. Customers without Splunk ES should consider adding this premium app to their Splunk deployment for the full functionality of the Add-on.
If you want to get started with the community-supported Add-on, customers can download it from Splunkbase today.
Happy Splunking!
----------------------------------------------------
Thanks!
Anthony Tellez
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.