Logo

dev-resources.site

for different kinds of informations.

Splunk: Building a Secure Monitoring Solution (Part 1)

Published at
6/8/2023
Categories
splunk
siem
cybersecurity
analyst
Author
e_liz_the_best
Categories
4 categories in total
splunk
open
siem
open
cybersecurity
open
analyst
open
Author
14 person written this
e_liz_the_best
open
Splunk: Building a Secure Monitoring Solution (Part 1)

During the last several weeks of my Cybersecurity boot camp, one of our final projects was to build a secure monitoring environment for a fictitious organization called VSI (Virtual Space Industries) using Splunk Enterprise, which for those who may not know, is a SIEM (Security Information and Event Manager). SIEMs are essential tools that companies can use to detect, analyze, and respond to potential threats against their organization.

Since this was a big project with a lot of steps, I'll be breaking it up into 2 parts:

Part 1:
Creating Reports, Alerts, and Dashboards for Windows server log data as well as Apache webserver log data that can help point out any abnormal activity.

Part 2:
Checking to see if the solutions created in part 1 were effective against a fictitious attack by uploading the attack log data and seeing if our reports, alerts, and dashboards, picked up anything that would have helped the organization take the appropriate action as quickly as possible.

Part 1
I started by launching Splunk, which had been pre-installed in my ubuntu VM. I logged into the application and uploaded the files I would be using to create reports, alerts and Dashboards for.

Image description

Image description

Once the logs were uploaded, I briefly took notice of and analyzed the following fields:
o signature
o signature_id
o user
o status
o severity

Image description

Apologies that some images might be a bit small and difficult to read. Luckily, I also took some screenshots of the data inside each individual field as well:

signature:
Image description

signature_id:
Image description

user:
Image description

status:
Image description

severity:
Image description

These would be the main points of interest we will be using to create our reports, alerts, and dashboard. Let's start with the reports!

Report 1: A report with a table of signatures and their associated signature_id. This would allow VSI to view reports that show the ID number associated with each specific signature for a Windows activity.

Image description

Report 2: A report that displays severity levels and the count and percentage of each. This would allow VSI to quickly understand the severity levels of Windows logs being viewed.

Image description

Report 3: A report that provides a comparison between the success and failure of Windows activities. This would show VSI is there is any suspicious level of failed activities on their Windows server.

Image description

Now that those were done, it was time to move onto creating the Alerts!

Alerts would all trigger an email to be sent to the fictitious company at [email protected]

Alert 1: An alert that is triggered when a threshold for hourly failed Windows activities has been reached. This would help VSI see if any failed logins or any other activities occurred an excessive amount of times within an hour, which could be indicative of someone trying to do something they shouldn't be able to do, such as trying to login and failing repeatedly.

Image description

The threshold for this alert I chose was > 18 per hour.

Alert 2: An alert that is triggered when a threshold has been reached for the amount of successful logins per hour.

Image description

The threshold I chose for this alert was anything > 26 per hour.

Alert 3: An alert that is triggered when a threshold is met for the signature count when a user's account has been deleted, once again in an hourly window.

Image description

For this alert, I chose anything > 35 within one hour.

Now for the fun part, creating Dashboards to monitor Windows Server Activity at a quick glance!

I always have a lot of fun creating dashboards in Splunk, this project being no exception. I made:

  1. A line chart that displays account deletion signatures over time within the span of 1h.
  2. A line char that displays the different user field values over time.
  3. A pie chart of the different signatures based on windows activities.
  4. Another pie chart showing the different users who are active.
  5. A final pie chart that tracks the source domain.

Line charts 1 & 2:
Image description

Pie Charts:
Image description

Image description

Full-view Windows Server Monitoring Dashboard:
Image description

Next, we needed to repeat this process, but for the Apache log data. I went ahead and uploaded the log files and got to work on the reports first.

This time, the important fields we wanted to pay special attention to were:
o method
o referrer_domain
o status
o clientip
o useragent

Report 1: A report that shows a table of the different HTTP Methods (GET, POST, HEAD, etc.). This would show VSI the types of HTTP requests being made to the VSI webserver.

Image description

Report 2: A report that displays the top 10 domains that refer to VSI's website, to help VSI identify any suspicious referrers.

Note: I found it kind of funny that 'referer' was spelled incorrectly (should be 'referrer' in the fields list), but knew it had to match the data, so spelled it incorrectly to match when I had to.

Image description

Report 3: A report that shows the count of each HTTP response code. This will help VSI to quickly gauge the overall health of their webserver and activities taking place on it.

Image description

With that, it was time to create some Alerts!

Alert 1: The project called for an alert that triggers whenever a connection is made from any IP address outside of the United States. I chose France for this example, which had an IP Address of 176.31.39.30 (Roubaix, France).

Image description

Alert 2: An alert that triggers whenever a threshold was met for the count of HTTP POST methods within the span of 1 Hour.

Image description

The threshold I chose for HTTP POST requests was anything > 10 within 1 hour.

And now back to the fun of creating visuals for our Dashboard!

HTTP GET Method requests per hour:
Image description

HTTP POST Method requests per hour:
Image description

HTTP Methods by type per hour:
Image description

Top Countries connecting to the server:
Image description

Top User agents:
Image description

Top URI:
Image description

Full-view Apache Server Monitoring Dashboard:
Image description

So there you have it! I created Reports, Alerts, and Monitoring Dashboards for VSI's Windows and Apache servers.

In Part 2 we will see whether or not the solutions I made protected VSI.

Part 2: https://dev.to/r33keeper/splunk-building-a-secure-monitoring-solution-part-2-208m

splunk Article's
30 articles in total
Favicon
10 Splunk SQL Interview Questions (Updated 2025)
Favicon
Log Analysis | Compromised wordpress | Privilege Escalation | Blue team labs online
Favicon
Log Analysis | Sysmon | Blue Team Labs Online
Favicon
Splunk - SSH Dashboard Creation
Favicon
What Is Splunk? A Definitive Guide for Beginners
Favicon
Automating Linux Distribution Updates with Ansible and Monitoring with Splunk
Favicon
How To Make A Custom Splunk Command
Favicon
OpenObserve - 140x lower storage cost for logs than Elasticsearch
Favicon
Building a professional website with Splunk integration on AWS (Part 1)
Favicon
Splunk: Building a Secure Monitoring Solution (Part 2)
Favicon
Splunk: Building a Secure Monitoring Solution (Part 1)
Favicon
Setting up a single Splunk Forwarder to send different data to multiple indexes
Favicon
Introduction to Splunk Certification.
Favicon
As quatro fases do Splunk: input, parsing, indexing e searching.
Favicon
Meu primeiro Lab com splunk
Favicon
How To Install & Manage Splunk Universal Forwarder in AWS Ec2
Favicon
Enrich Splunk events with Steampipe
Favicon
Display CockroachDB metrics in Splunk Dashboards
Favicon
Splunk logo in python
Favicon
Is Splunk Certification Worth It?
Favicon
Why Splunk Certification is a Top Skill for Data Scientists
Favicon
3 Common Challenges Faced When Deploying Splunk
Favicon
Tips about Splunk Timecharts
Favicon
seeking help in regex
Favicon
Splunk Alert on Percentage Change in text Field Frequency
Favicon
Auth0 and Splunk Provide Enhanced Security and Operational Monitoring and Insights
Favicon
Splunk: AWS CloudWatch Log Ingestion - Part 2 - Splunk Add-On for AWS
Favicon
Splunk: AWS CloudWatch Log Ingestion - Part 1 - Introduction & Setup
Favicon
Splunk Tutorial | What Is Splunk | Splunk Tutorial For Beginners - Intellipaat
Favicon
Trying out Splunk in a Docker Container

Featured ones: