Skip to main content
false
Footer icon fix, PDB mobile header fix, list css fix
shared header v2
Lucid Search Bar Implementation
Push Down Banner V1 Analytics Patch (3/18/24), remove it if not using v1
Global nav V2 patch, remove after adding the mobile languages fix in the codebase (S7 or S8)
transitional logo header/footer patch

Machine Learning Security Blogs

Latest Articles

Security 6 Min Read

Building Large-Scale User Behavior Analytics: Data Validation and Model Monitoring

Splunk's Cui Lin explores fundamental techniques to validate data volume and monitor models to understand the size of your own UBA clusters.
Security 5 Min Read

Enhance Security Resilience Through Splunk User Behavior Analytics VPN Models

This blog introduces new machine learning models in Splunk UBA for VPN connection monitoring to enhance WFH security resilience.
Industries 10 Min Read

Machine Learning in General, Trade Settlement in Particular

Use the Splunk Machine Learning Toolkit to predict the categorical value of any binary field in an event, and how this approach can be used to predict whether a financial trade will settle before its deadline based on the business semantics of related data.
Security 8 Min Read

Machine Learning in Security: Detect DNS Data Exfiltration Using Deep Learning

This blog discusses in detail about detecting DNS data exfiltration attacks using deep learning
Security 8 Min Read

Machine Learning in Security: Detect Suspicious TXT Records Using Deep Learning

The Splunk Machine Learning for Security (SMLS) team introduces a new detection to detect DNS Tunneling using DNS TXT payloads.
Security 7 Min Read

Machine Learning in Security: Detecting Suspicious Processes Using Recurrent Neural Networks

Splunk's Kumar Sharad explains how to detect suspicious processes using recurrent neural networks.
Security 8 Min Read

Machine Learning in Security: Deep Learning Based DGA Detection with a Pre-trained Model

The Splunk Machine Learning for Security team introduces a new detection to detect Domain Generation Algorithms generated domains.
Security 7 Min Read

Machine Learning in Security: NLP Based Risky SPL Detection with a Pre-trained Model

The Splunk Threat Research Team shares a closer look at a hunting analytic and two machine learning-based detections that help find users running highly suspicious risky SPL commands.
Security 6 Min Read

ML Detection of Risky Command Exploit

Discover how to use machine learning algorithms to develop methods for detecting misuse or abuse of risky SPL commands to further pinpoint a true security threat.