-
61.
公开(公告)号:US11363047B2
公开(公告)日:2022-06-14
申请号:US17018360
申请日:2020-09-11
Applicant: Splunk Inc.
Inventor: Vijay Chauhan , Cary Noel , Wenhui Yu , Luke Murphey , Alexander Raitz , David Hazekamp
IPC: H04L9/40 , G06F3/0484 , G06F16/25 , G06F16/248 , G06F16/2458 , H04L43/026 , G06F40/169 , G06F21/62 , H04L43/06
Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
-
公开(公告)号:US11354322B2
公开(公告)日:2022-06-07
申请号:US16715015
申请日:2019-12-16
Applicant: Splunk Inc.
Inventor: Lucas Murphey , David Hazekamp
IPC: G06F16/20 , G06F16/2457 , G06F16/951 , G06F16/23 , G06F16/2458 , G06F16/2455 , G06F16/22 , G06F16/215
Abstract: Systems and methods for assigning scores to objects based on evaluating triggering conditions applied to datasets produced by search queries in data aggregation and analysis systems. An example method may comprise providing an interface for generating a correlation search, the interface facilitating user input of (i) one or more search criteria for a search query of the correlation search, (ii) a triggering condition to be applied to a dataset produced by the search query, and (iii) one or more actions to be performed when the dataset produced by search query satisfies the triggering condition, wherein the one or more actions comprise at least modifying a score assigned to an object to which the dataset produced by the search query pertains, and causing generation of the correlation search based on the user input.
-
公开(公告)号:US11288283B2
公开(公告)日:2022-03-29
申请号:US16394733
申请日:2019-04-25
Applicant: SPLUNK INC.
Inventor: Vijay Chauhan , Banipal Shahbaz , David Hazekamp
IPC: G06F16/26 , G06F16/22 , G06F16/901
Abstract: A data intake and query system measures an amount of raw data ingested by the system during defined periods of time. As used herein, ingesting raw data generally refers to receiving the raw data from one or more computing devices and processing the data for storage and searchability. Processing the data may include, for example, parsing the raw data into “events,” where each event includes a portion of the received data and is associated with a timestamp. Based on a calculated number of events generated by the system during one or more defined time periods, the system may calculate various metrics including, but not limited to, a number of events generated during a particular day, a number of events generated per day over a period of time, a maximum number of events generated in a day over a period of time, an average number of events generated per day, etc.
-
公开(公告)号:US10860655B2
公开(公告)日:2020-12-08
申请号:US15688323
申请日:2017-08-28
Applicant: Splunk Inc.
Inventor: Lucas Murphey , David Hazekamp
IPC: G06F17/00 , G06F16/903 , G06F16/9032 , G06F16/906 , G06F16/907 , G06F17/30
Abstract: One or more processing devices receive a definition of a search query for a correlation search of a data store, the data store comprising time-stamped events that each comprise a portion of raw machine data reflecting activity in an information technology environment and produced by a component of the information technology environment, receive a definition of a triggering condition to be applied to a dataset that is produced by the search query, receive a definition of one or more actions to be performed when the dataset produced by the search query satisfies the triggering condition, test the search query with the triggering condition, and cause, based on results of the testing, generation of the correlation search using the defined search query, the triggering condition, and the one or more actions, the correlation search comprising search processing language having the search query and a processing command for criteria on which the triggering condition is based.
-
公开(公告)号:US10817544B2
公开(公告)日:2020-10-27
申请号:US14701301
申请日:2015-04-30
Applicant: Splunk Inc.
Inventor: Vijay Chauhan , Banipal Shahbaz , David Hazekamp
IPC: G06F16/28 , G06F16/22 , G06F16/2458
Abstract: A data intake and query system measures an amount of raw data ingested by the system during defined periods of time. As used herein, ingesting raw data generally refers to receiving the raw data from one or more computing devices and processing the data for storage and searchability. Processing the data may include, for example, parsing the raw data into “events,” where each event includes a portion of the received data and is associated with a timestamp. Based on a calculated number of events generated by the system during one or more defined time periods, the system may calculate various metrics including, but not limited to, a number of events generated during a particular day, a number of events generated per day over a period of time, a maximum number of events generated in a day over a period of time, an average number of events generated per day, etc.
-
公开(公告)号:US10735492B2
公开(公告)日:2020-08-04
申请号:US16397434
申请日:2019-04-29
Applicant: SPLUNK INC.
Inventor: Vijay Chauhan , Liu-Yuan Lai , Wenhui Yu , Luke Murphey , David Hazekamp
Abstract: Provided are systems and methods for indicating deployment of application features. In one embodiment, a method is provided that includes determining available features of a current deployment of an application for receiving machine-generated data from one or more data sources of a data system, determining un-deployed features of the current deployment of the application, wherein the un-deployed features comprise one or more of the available features that is configured to use input data from a data source and wherein the input data is not available to the feature in the current deployment of the application, and causing display of a deployment graphical user interface (GUI) that comprises an indication of the un-deployed features.
-
公开(公告)号:US10567412B2
公开(公告)日:2020-02-18
申请号:US16100147
申请日:2018-08-09
Applicant: SPLUNK INC.
Inventor: Munawar Monzy Merza , John Coates , James M Hansen , Lucas Murphey , David Hazekamp , Michael Kinsley , Alexander Raitz
IPC: H04L29/06 , G06F21/55 , G06F16/2458
Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.
-
公开(公告)号:US20190251095A1
公开(公告)日:2019-08-15
申请号:US16394733
申请日:2019-04-25
Applicant: SPLUNK INC.
Inventor: Vijay Chauhan , Banipal Shahbaz , David Hazekamp
IPC: G06F16/26 , G06F16/22 , G06F16/901
CPC classification number: G06F16/26 , G06F16/22 , G06F16/901 , G06Q2220/18
Abstract: A data intake and query system measures an amount of raw data ingested by the system during defined periods of time. As used herein, ingesting raw data generally refers to receiving the raw data from one or more computing devices and processing the data for storage and searchability. Processing the data may include, for example, parsing the raw data into “events,” where each event includes a portion of the received data and is associated with a timestamp. Based on a calculated number of events generated by the system during one or more defined time periods, the system may calculate various metrics including, but not limited to, a number of events generated during a particular day, a number of events generated per day over a period of time, a maximum number of events generated in a day over a period of time, an average number of events generated per day, etc.
-
公开(公告)号:US10282455B2
公开(公告)日:2019-05-07
申请号:US14691475
申请日:2015-04-20
Applicant: Splunk Inc.
Inventor: Vijay Chauhan , Banipal Shahbaz , David Hazekamp
IPC: G06F17/30
Abstract: A data intake and query system measures an amount of raw data ingested by the system during defined periods of time. As used herein, ingesting raw data generally refers to receiving the raw data from one or more computing devices and processing the data for storage and searchability. Processing the data may include, for example, parsing the raw data into “events,” where each event includes a portion of the received data and is associated with a timestamp. Based on a calculated number of events generated by the system during one or more defined time periods, the system may calculate various metrics including, but not limited to, a number of events generated during a particular day, a number of events generated per day over a period of time, a maximum number of events generated in a day over a period of time, an average number of events generated per day, etc.
-
公开(公告)号:US20180351983A1
公开(公告)日:2018-12-06
申请号:US16100147
申请日:2018-08-09
Applicant: SPLUNK INC.
Inventor: Munawar Monzy Merza , John Coates , James M Hansen , Lucas Murphey , David Hazekamp , Michael Kinsely , Alexander Raitz
CPC classification number: H04L63/1425 , G06F16/2477 , G06F21/552 , G06F2221/2151 , H04L63/1408 , H04L63/1416
Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.
-
-
-
-
-
-
-
-
-