heroui logo

Detect Spike in Network ACL Activity

Splunk Security Content

View Source
Summary
The rule named "Detect Spike in Network ACL Activity" identifies unusual patterns in API activity related to AWS Network ACLs by monitoring changes in traffic over time. This detection leverages AWS CloudTrail data to generate baseline metrics and subsequently flags significant spikes based on user-defined thresholds. Although stated to be deprecated, it serves as a valuable detection method against potential misuse or anomalous behavior within AWS environments. The search mechanism constructs statistical parameters, including average API calls and standard deviation, from historical data using a lookup table. The rule is particularly concerned with identifying spikes in activity that exceed typical patterns, thus alerting security teams to potential breaches or erroneous configurations in network controls. Users are encouraged to customize the thresholds suitable to their operational context, ensuring appropriate sensitivity to their specific traffic patterns. Implementing the detection requires specific Splunk apps for proper functioning, alongside periodic runs of the baseline search for accurate historical comparisons, making it crucial for ongoing monitoring and adjustment as network behavior evolves.
Categories
  • Cloud
  • AWS
Data Sources
    ATT&CK Techniques
    • T1562.007
    Created: 2024-11-14