Systems and methods for detecting beaconing communications using machine learning techniques

    公开(公告)号:US12199997B1

    公开(公告)日:2025-01-14

    申请号:US17573335

    申请日:2022-01-11

    Applicant: SPLUNK Inc.

    Abstract: A computerized method is disclosed that includes operations of obtaining network traffic data between a source device and a destination device, applying a set of one or more security rules to a plurality of metrics of the network traffic data to obtain a subset of network traffic metrics, applying a first trained machine learning model to the subset of network traffic metrics to generate a feature vector through feature extraction of the subset of network traffic metrics, and evaluate the feature vector for a presence of beaconing and classify the subset of network traffic metrics, and responsive to the classifying of the subset of network traffic metrics, generating a flag for a system administrator. The plurality of metrics include at least one or more of packet size, packet transmission rate, or a ratio of (i) packet size for inbound packets and (ii) packet size for outbound packets.

    Ingest preview of events in a network computing environment

    公开(公告)号:US12197968B1

    公开(公告)日:2025-01-14

    申请号:US17875172

    申请日:2022-07-27

    Applicant: Splunk Inc.

    Abstract: A computing device receives an ingest preview request to preview events to be stored by at least one indexer. Responsive to the ingest preview request, the computing device sends a subscription request to the forwarders. The forwarders receive the subscription request and intercept the events that are being sent to at least one of the indexers. The forwarders then clone matching events to the subscription request and responds to the computing device with the matching events. When the computing device receives the matching events, the computing device adds the matching events to a dispatch directory. The user interface is then populated with events in the dispatch directory.

    Integration of cloud-based and non-cloud-based data in a data intake and query system

    公开(公告)号:US12197442B1

    公开(公告)日:2025-01-14

    申请号:US17937902

    申请日:2022-10-04

    Applicant: Splunk Inc.

    Abstract: A software module ingests data into a data intake and query system. At least a portion of the data is cloud data. The software module includes an event type definition that specifies a type of data to be ingested by the software module, a first tag that associates ingested data of the event type with a data model, and a second tag that designates ingested data of the event type as cloud data. The ingested data is stored in a data repository, and subsequently a search query that includes the first tag and the second tag is executed against the data repository, to identify ingested cloud data that satisfies the search query and a first search constraint specified in the data model. A display device is caused to display a visualization based on the identified ingested cloud data that satisfies the search query.

    Generating information technology incident risk score narratives

    公开(公告)号:US12135788B1

    公开(公告)日:2024-11-05

    申请号:US17390290

    申请日:2021-07-30

    Applicant: Splunk Inc.

    Abstract: Techniques are described for enabling an application to automatically generate text narratives explaining risk scores assigned to risk objects. The application uses natural language generation (NLG) techniques to enable the automatic create text narratives providing context and explanation for risk scores. The described approaches use data from a variety of data sources (e.g., risk event indexes, correlation search data, attack framework data, etc.) to create compelling and useful explanations of the risk analysis associated with identified risk objects. These automatically generated text narratives can be readily presented in any number of different interfaces without the need for complex visualizations or user effort to derive the same information. The automatically created text narratives enable users to better understand the risk analysis for particular risk objects, obtain storylines detailing risk objects' activity patterns over time, and to better analyze, triage, and mitigate IT environment risks based on such information.

    Artifact life tracking storage
    579.
    发明授权

    公开(公告)号:US12135710B2

    公开(公告)日:2024-11-05

    申请号:US17586634

    申请日:2022-01-27

    Applicant: Splunk Inc.

    Abstract: Artifact life tracking storage techniques include performing an artifact request of an artifact at an artifact storage node. A current time to live (TTL) value is identified. A determination is made whether to increment a TTL flag of the artifact. Responsive to determining that the TTL tag should be incremented, the TTL flag is incremented to a subsequent value in a TTL extender list. Responsive to incrementing the TTL tag, the TTL modified tag value is set to the current time value.

Patent Agency Ranking