Assignment: Create a report to determine the impact of the DDOS attack on upload and download speed. Create an additional field to calculate the ratio of the upload speed to the download speed.
Used the eval command to create a field called ratio that shows the ratio between the upload and download speeds. Then, created a report using Splunk's table command to display the _time, IP_ADDRESS, DOWNLOAD_MEGABITS, UPLOAD_MEGABITS, ratio fields in a statistics report.
Findings
Based on the report generated above, 2/23/2020 @ 2:30 was the approximate time of the DDOS attack on Vandalay. Its reasonable to infer that the attack took place during that time due to the sharp decline in download and upload speeds recorded during that time. I took Vandlay's system approximately 6 hours to recover.
Assignment: Create a report determining how many critical vulnerabilities exist on the customer data server. Then, build an alert to notify your team if a critical vulnerability reappears on this server.
After uploading the Nessues vulnerability scan to Splunk, created a report that shows the count of critical vulnerabilities from the customer database server (10.11.36.23) and counted the number vulnerabilities by their level of severity (informational, low, medium, high, critical).
From the above report, built an alert that monitors every day to see if this server has any critical vulnerabilities. If a critical vulnerability exists, the alert will send an email to [email protected].
Assignment: Analyze administrator logs that document a brute force attack. Then, create a baseline of the ordinary amount of administrator bad logins and determine a threshold to indicate if a brute force attack is occurring.
After uploading the admin logs to Splunk, created a timechart that shows the number of failed logon attempts over the entirety of the dataset. Decided to visualize this data as a column chart to better understand the data. This allowed me to easily determine a threshold of greater than 24 failed logon attempts for the Brute Force Attack Alert I created below.
From the above timechart, built an alert that monitors failed logon attempts evey hour. If greater than 24 failed logon attempts are detected, the alert will send an email to [email protected].