CAPTURE TRIGGERS FOR CAPTURING NETWORK DATA

    公开(公告)号:US20170142146A1

    公开(公告)日:2017-05-18

    申请号:US15421269

    申请日:2017-01-31

    Applicant: Splunk Inc.

    CPC classification number: H04L63/1425 H04L63/0218 H04L63/0236

    Abstract: The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system provides a risk-identification mechanism for identifying a security risk from time-series event data generated from network packets captured by one or more remote capture agents distributed across a network. Next, the system provides a capture trigger for generating additional time-series event data from the network packets on the one or more remote capture agents based on the security risk, wherein the additional time-series event data includes one or more event attributes.

    Timeline displays of network security investigation events
    22.
    发明授权
    Timeline displays of network security investigation events 有权
    时间线显示网络安全调查事件

    公开(公告)号:US09516052B1

    公开(公告)日:2016-12-06

    申请号:US14815981

    申请日:2015-08-01

    Applicant: Splunk Inc.

    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.

    Abstract translation: 公开了技术和机制,使网络安全分析师和其他用户有效地进行网络安全调查并产生调查结果的有用表示。 如本文所使用的,网络安全调查通常是指分析者(或分析师小组)对可能对管理的计算机网络造成内部和/或外部威胁的一个或多个检测到的网络事件的分析。 网络安全应用程序提供各种接口,使用户能够创建调查时间表,其中调查时间表显示与特定网络安全调查相关的事件的集合。 网络安全应用程序还提供监视和记录与网络安全应用程序的用户交互的功能,其中特定记录的用户交互也可以被添加到一个或多个调查时间线。

    Analyzing a group of values extracted from events of machine data relative to a population statistic for those values
    23.
    发明授权
    Analyzing a group of values extracted from events of machine data relative to a population statistic for those values 有权
    分析从机器数据事件中提取的一组相对于这些值的人口统计量的值

    公开(公告)号:US09516046B2

    公开(公告)日:2016-12-06

    申请号:US14929321

    申请日:2015-10-31

    Applicant: Splunk Inc.

    Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.

    Abstract translation: 为表征计算通信或对象的一组事件中的每个事件确定度量值。 例如,度量值可以包括事件中的URL或代理字符串的长度。 生成子集标准,使得子集内的度量值与群体的中心(例如,分布尾部)相对分开。 将标准应用于度量值产生一个子集。 该子集的表示呈现在交互式仪表板中。 该表示可以包括子集中的唯一值和相应事件发生的计数。 客户端可以选择表示中的特定元素,以便相对于子集中的特定值对应的各个事件来呈现更多的细节。 因此,客户可以使用他们的知识系统操作和遵守价值频率和基础事件来识别异常度量值和潜在的安全威胁。

    Blacklisting and whitelisting of security-related events
    24.
    发明授权
    Blacklisting and whitelisting of security-related events 有权
    将安全相关事件列入黑名单并列出白名单

    公开(公告)号:US08752178B2

    公开(公告)日:2014-06-10

    申请号:US13956285

    申请日:2013-07-31

    Applicant: Splunk Inc.

    Abstract: A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the GI.

    Abstract translation: 所公开的计算机实现的方法包括接收和索引原始数据。 索引包括将原始数据划分为包含与计算机或网络安全相关的信息的时间戳搜索事件。 将索引数据存储在索引数据存储中,并使用模式从索引数据中的字段中提取值。 搜索提取的字段值以获取安全信息。 使用安全信息确定一组安全事件。 每个安全事件都包括由条件指定的字段值。 提供包括安全事件组的摘要,安全事件的其他摘要和删除元素(与摘要相关联)的图形界面(GI)。 接收与删除元素的交互相对应的输入。 与删除元素进行交互会导致摘要从GI中移除。 更新GI以从GI中删除摘要。

    KEY INDICATORS VIEW
    25.
    发明申请
    KEY INDICATORS VIEW 审中-公开
    主要指标

    公开(公告)号:US20130318236A1

    公开(公告)日:2013-11-28

    申请号:US13956338

    申请日:2013-07-31

    Applicant: Splunk, Inc.

    CPC classification number: H04L43/045 H04L41/22

    Abstract: A system and computer-implemented is provided for displaying a configurable metric relating to an environment in a graphical display along with a value of the metric calculated over a configurable time period. The metric is used to identify events of interest in the environment based on processing real time machine data from one or more sources. The configurable metric is selected and a corresponding value is calculated based on the events of interest over the configurable time period. The value of the metric may be continuously updated in real time based on receiving additional real-time machine data and displayed in a graphical interface as time progresses. Statistical trends in the value of the metric may also be determined over the configurable time period and displayed in the graphical interface as well as an indication if the value of the metric exceeds a configurable threshold value. Further, a selection of one or more thresholds for the value of the metric may be applied and an indication displayed indicating if the threshold(s) have been exceeded.

    Abstract translation: 提供了一种系统和计算机实现的,用于显示与图形显示中的环境相关的可配置度量以及在可配置的时间段内计算出的度量的值。 该度量用于基于处理来自一个或多个源的实时机器数据来识别环境中感兴趣的事件。 选择可配置度量,并根据可配置时间段内感兴趣的事件计算相应的值。 可以基于接收附加的实时机器数据来实时地持续更新度量的值,并且随着时间的推移在图形界面中显示。 度量值的统计趋势也可以在可配置的时间周期上确定并显示在图形界面中,以及指示值是否超过可配置的阈值。 此外,可以应用对度量的值的一个或多个阈值的选择,并且显示指示是否已经超过阈值的指示。

    Identifying un-deployed features of an application

    公开(公告)号:US11477263B2

    公开(公告)日:2022-10-18

    申请号:US16920911

    申请日:2020-07-06

    Applicant: SPLUNK INC.

    Abstract: Provided are systems and methods for indicating deployment of application features. In one embodiment, a method is provided that includes determining available features of a current deployment of an application for receiving machine-generated data from one or more data sources of a data system, determining un-deployed features of the current deployment of the application, wherein the un-deployed features comprise one or more of the available features that is configured to use input data from a data source and wherein the input data is not available to the feature in the current deployment of the application, and causing display of a deployment graphical user interface (GUI) that comprises an indication of the un-deployed features.

    GENERATING EVENTS IN EXCESS OF LICENSED EVENT COUNT

    公开(公告)号:US20210011932A1

    公开(公告)日:2021-01-14

    申请号:US17038472

    申请日:2020-09-30

    Applicant: SPLUNK Inc.

    Abstract: In various implementations, a computer-implemented method for remotely managing settings of applications includes receiving a network communication from a managed device, the received network communication including a client-side hash value. The method further includes identifying settings for an application on the managed device in response to the receiving of the network communication, where the identified settings include configuration instructions for the application. Based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, at least some of the identified settings are transmitted to the managed device. The transmitting of the at least some of the identified settings can be based on the comparison indicating a mismatch between the received client-side hash value and the server-side hash value. The method may also include completing processing of the received network communication after the transmitting of the at least some of the identified settings.

    IDENTIFYING UN-DEPLOYED FEATURES OF AN APPLICATION

    公开(公告)号:US20200336532A1

    公开(公告)日:2020-10-22

    申请号:US16920911

    申请日:2020-07-06

    Applicant: SPLUNK INC.

    Abstract: Provided are systems and methods for indicating deployment of application features. In one embodiment, a method is provided that includes determining available features of a current deployment of an application for receiving machine-generated data from one or more data sources of a data system, determining un-deployed features of the current deployment of the application, wherein the un-deployed features comprise one or more of the available features that is configured to use input data from a data source and wherein the input data is not available to the feature in the current deployment of the application, and causing display of a deployment graphical user interface (GUI) that comprises an indication of the un-deployed features.

    Configuring the generation of additional time-series event data by remote capture agents

    公开(公告)号:US10812514B2

    公开(公告)日:2020-10-20

    申请号:US16228509

    申请日:2018-12-20

    Applicant: Splunk Inc.

    Abstract: The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system provides a risk-identification mechanism for identifying a security risk from time-series event data generated from network packets captured by one or more remote capture agents distributed across a network. Next, the system provides a capture trigger for generating additional time-series event data from the network packets on the one or more remote capture agents based on the security risk, wherein the additional time-series event data includes one or more event attributes.

    Key indicators view
    30.
    发明授权

    公开(公告)号:US10574548B2

    公开(公告)日:2020-02-25

    申请号:US13956338

    申请日:2013-07-31

    Applicant: Splunk, Inc.

    Abstract: A system and computer-implemented is provided for displaying a configurable metric relating to an environment in a graphical display along with a value of the metric calculated over a configurable time period. The metric is used to identify events of interest in the environment based on processing real time machine data from one or more sources. The configurable metric is selected and a corresponding value is calculated based on the events of interest over the configurable time period. The value of the metric may be continuously updated in real time based on receiving additional real-time machine data and displayed in a graphical interface as time progresses. Statistical trends in the value of the metric may also be determined over the configurable time period and displayed in the graphical interface as well as an indication if the value of the metric exceeds a configurable threshold value. Further, a selection of one or more thresholds for the value of the metric may be applied and an indication displayed indicating if the threshold(s) have been exceeded.

Patent Agency Ranking