This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
      • Netwitness XDR
      • EC-Council Training
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
    • Role-Based Training
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Community Blog
Subscribe to the official NetWitness Community blog for information about new product features, industry insights, best practices, and more.
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
  • NetWitness Community
  • Blog
  • Trend Analysis with the Netwitness Suite

Trend Analysis with the Netwitness Suite

DavideVeneziano
DavideVeneziano Beginner
Beginner
Options
  • Subscribe to RSS Feed
  • Mark as New
  • Mark as Read
  • Bookmark
  • Subscribe
  • Printer Friendly Page
  • Report Inappropriate Content
‎2016-08-18 09:46 AM

The Netwitness Suite provides out-of-the-box a number of tools to analyze your data. But there is a capability hidden under the hood which if implemented correctly may be precious to identify additional suspicious patterns: the development of a baseline to perform a trend analysis.

 

This approach can help whenever a significant change in the rate  of a given value could imply a security issue. Of course not all the threats can be identified in this way!

 

To perform any statistical analysis, numbers are an obvious requirement and these have to be derived from the collected events first. The attached (unofficial) model, inspired by the new 10.6 Event source Automatic Monitoring functionality, offers a solid way to count the number of occurrences without requiring to buffer all the events in memory for a long timeframe. 

 

For each value of a given meta key, the number of occurrences are counted every minute and then aggregated every five minutes, hour and day to minimize the impact on ESA performance. Then, for each hour (and for each day), a baseline is created.

 

1.png

 

In case there is a significant deviation in the rate of any meta value, an alert is generated.

2.png

The duration of the learning phase, the entity of the deviation and the duration of the baseline are all configurable parameters. 

 

As an implementation best practice, do not use meta keys with too many unique values (e.g. ip.src) since would generate too many false positives. Start focusing on those with a few but significant unique values, like as:

  • Browsers - uncommon client may be associated with malicious codes
  • Country source/destination - can help identifying attacks or potential data exfiltration
  • TLDs - uncommon TLDs can be an indicator of something strange happening

 

All the details regarding the model, how it works, how to implement it and all the technical details can be found in the attached presentation together with the full EPL code.

 

For a different but complementary approach, I'd suggest reading this excellent post by Nikolay Klender‌: https://community.rsa.com/thread/187264 

 

Please note this is not RSA official/supported content so use it at your own risk!

ESA_baseline_model_v2.1.txt.zip
ESA_baseline_model_v2.2.txt.zip
  • anomaly detection
  • baseline
  • EPL
  • ESA
  • Esper
  • NetWitness
  • NW
  • NWP
  • RSA NetWitness
  • RSA NetWitness Platform
ESA_baseline_model_v2.1.txt.zip
ESA_baseline_model_v2.2.txt.zip
833 KB
8 Likes
3 Comments
DavideVeneziano
DavideVeneziano Beginner
Beginner
  • Mark as Read
  • Mark as New
  • Bookmark
  • Permalink
  • Print
  • Report Inappropriate Content
‎2016-09-01 09:06 AM
‎2016-09-01 09:06 AM

Hi, for those asking how this model can be used to generate and apply a different baseline between working days and the weekend, I'm attaching to the post the file ESA_baseline_model_v2.2.txt. 

 

Since having the same baseline model for multiple days is not that easy to implement in EPL, we are creating a model for each day of the week (e.g. comparing Monday 8am-9am timeframe with the baseline created across previous mondays during the same hour).

2 Likes
MihaMesojedec
Employee MihaMesojedec
Employee
  • Mark as Read
  • Mark as New
  • Bookmark
  • Permalink
  • Print
  • Report Inappropriate Content
‎2016-09-26 06:12 AM
‎2016-09-26 06:12 AM

Davide have you consider using Memory Pool in ESA for baseline use case?

https://community.rsa.com/docs/DOC-54932 

 

Thanks,

Miha

0 Likes
DavideVeneziano
DavideVeneziano Beginner
Beginner
  • Mark as Read
  • Mark as New
  • Bookmark
  • Permalink
  • Print
  • Report Inappropriate Content
‎2016-09-26 06:46 AM
‎2016-09-26 06:46 AM

Good point Miha. From my understanding and for this specific use case the Memory Pool would not completely solve the issue of the large timeframe and may not perform in an ideal way. For sure a combination between the multi-phase approached I've used in the rule and Memory Pool could be powerful.

Thanks

0 Likes

You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.

  • Comment
Latest Articles
  • FirstWatch Threat Spotlight: HAVOC C2
  • FirstWatch Threat Spotlight – BlueSky Ransomware
  • Advanced HTTP and TLS Concepts (Video)
  • Using NetWitness to Detect Command and Control: SILENTTRINITY C2
  • FirstWatch Threat Spotlight – Remcos RAT
  • FirstWatch Threat Spotlight: The LockBit Conundrum - A Glimpse into Ransomware Warfare
  • Content Hygiene – Application Rule Alert Mapping Updates
  • Microsoft Azure Log Analytics workspace integration with Netwitness
  • FirstWatch Threat Spotlight: Cryptonite Ransomware
  • Deployment Inventory (Serial Numbers)
Labels
  • Announcements 64
  • Events 8
  • Features 11
  • Integrations 12
  • Resources 67
  • Tutorials 32
  • Use Cases 29
  • Videos 118
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.