Splunk for Security Investigation: Command and Control Analysis

Network data, such as firewall, web proxy, or NetFlow contains detailed records of all activities between users and hosts, since the network is the medium for all device communication. Through this exercise, you will learn how to detect web proxy traffic anomalies that could indicate command and control activities. Watch the video, then try it yourself by following these instructions with this online Splunk instance pre-loaded with security data. Already using Splunk? Download the Getting Started with Splunk Security App, to get demo data and follow along with the scenarios.

 


--