SlideShare a Scribd company logo
Anomaly Detection using Machine Learning
Predictive Analytics
the anomaly detection company
Terminology
• Machine-learning
 Autonomous self-learning without the assistance of humans
(unsupervised learning)
• Predictive Analytics
 Probabilistic prediction of behavior based upon observed past
behavior
• Anomaly Detection
 what’s “different” or weird” versus what’s “good” or “bad”
Q: What’s Interesting Here?
3
A: Only What’s Behaving Abnormally
4
Anomaly Detection - an Analogy
• How could I accurately predict how much Postal-mail you are likely to
get delivered to your home tomorrow?
• And, how would I know if the amount you received was “abnormal”?
A practical methodology would involve…
• First, determine what’s normal before I can declare what’s abnormal
• Watch your mail delivery volume for a while…
 1 day?
 1 week?
 1 month?
• Notice, that you intuitively feel like you’ll gain accuracy in your
predictions with more data that you see.
• Ideally, use those observations to create a…
Probability Distribution Function
pieces of mail per day
%likelihood(probability)
Probability Distribution Function
pieces of mail per day
%likelihood(probability)
Best for my house
Probability Distribution Function
pieces of mail per day
%likelihood(probability)
College Student?
Probability Distribution Function
pieces of mail per day
%likelihood(probability)
My Mom
Finding “what’s unexpected”…
Your job is often looking for unexpected change in
your environment, either proactively through
monitoring or reactively through
diagnostics/troubleshooting
Using the PDF to Find
What is Unexpected
pieces of mail per day
%likelihood(probability)
zero
pieces of
mail?
fifteen
pieces of
mail?
Relate back to IT and Security data
• # Pieces of mail = # events of a certain type
 Number of failed logins
 Number of errors of different types
 Number of events with certain status codes
 Etc.
• Or, performance metrics
 Response time
 Utilization %
=> Every kind of data will need its own unique “model” (probability
distribution function)
Do You Know How to Accurately Model?
• Which one(s) models your data
best?
• You will want to get it right
14
source: “Doing Data Science”
O’Neil & Schutt
avg +/- 2 stdev
assumes Gaussian
(Normal)
Distribution!
Gaussian (“Normal”) Distribution
15
Non-Gaussian Data
status=503
status=404
CPU load
Memory Utilization
Revenue Transactions
Standard Deviations – Not so Good
33,000+ performance metrics analyzed using +/-
2.5σ
0
1000
2000
3000
4000
5000
6000
7000
28 Feb 00:00 28 Feb 12:00 01 Mar 00:00 01 Mar 12:00 02 Mar 00:00 02 Mar 12:00 03 Mar 00:00 03 Mar 12:00
• Never less than 900 alerts per hour
• Real outage (circled)
overshadowed by ~6000
extraneous alerts
Total # Alerts
Don’t worry, we have you covered
• Prelert uses sophisticated
machine-learning techniques
to best-fit the right statistical
model for your data.
• Better models = better outlier
detection = less false alarms
20
21
DEMO
Kinds of Anomalies Detected
22
Deviations in event count vs. time
Deviations in values vs. time
Rare occurrences of things
Population/Peer outliers
#1) Deviations in Event Counts/Rates
• Use Case: Online Commerce Site
 Cyclical online ordering volume (credit cards, etc.)
 Service outage on May 10th orders not being processed, dip in afternoon volume
23
Hard to automatically detect because…
• Tricky to catch with thresholds because overall count didn’t dip below low watermark
• Output of Splunk “predict”:
24
Prelert finds the anomaly perfectly
25
• No extraneous false alarms
• Despite the inherent challenges of the periodic nature of the data
#2) Deviations in Performance Metrics
• Use Case: Online travel portal
• Makes web services calls to airlines for fare quotes
• Each airline responds to fare request with its own typical response
time (20 airlines):
26
Hard to automatically detect because…
• Tricky to construct unique thresholds for each airline individually
• Cannot do “avg +/- 2σ” because it is too noisy for this kind of data
• Splunk’s “predict” doesn’t support explosion out via by clause (“by airline”)
27
Prelert finds the anomaly perfectly
28
• Only 1 of the many airlines is having an issue
#3) Rare Items as Anomalies
• Use Case: Security team @ services company
• Wanted to profile typical processes on each host using netstat
• Goal was to identify rare processes that “start up and communicate”
for each host, individually
29
Hard to automatically detect because…
• Each host has it’s own separate “set” of typical processes
that are potentially unique
• i.e. FTP may run routinely run on server A, but never runs on server
B
• Maintaining a running list of “typical processes” across
hundreds of servers not practical
• Splunk “rare” command is not truly a rarity measurement,
just “least occurring”
30
Prelert finds the anomaly perfectly
31
• Finds FTP process running for 3 hours on system that doesn’t normally run FTP
#4) Population / Peer Outliers
• Use Case: Proxy log data
 Need to determine which users/systems are sending
out requests/data much differently than the others
32
Hard to automatically detect because…
• Peer analysis is impossible without Prelert
33
Prelert finds the anomaly perfectly
34
• One particular host sending many requests (20,000/hr) to an IIS webserver
• This is an attempt to hack the webserver
Anomaly Detective App
• Free to download and try – 100% native Splunk app
• Easy to use – “push button anomaly detection”
• More powerful anomaly detection than Splunk on its own
• Scalable for big data sets
35
http://goo.gl/KJY9B
Bonus – Anomaly Cross-Correlation
• Use Case: Retail company with flaky POS application (gift card
redemption)
 App occasionally disconnects from DB
 Team suspects either a DB or a network problem, but hard to find cause
• Prelert configured to run anomaly detection across 3 data types
simultaneously
 App logs (unstructured) – count by dynamic message type
 SQL Server performance metrics
 Network performance metrics
36
Result: Instant Answers
37
Symptom: Sudden
influx of DB errors
in log
Symptom: Drop in
SQL Server client
connections
Cause: Network
spike and TCP
discards

More Related Content

PPTX
Simple math for anomaly detection toufic boubez - metafor software - monito...
PPTX
SplunkLive! Prelert Session - Extending Splunk with Machine Learning
PDF
Influx/Days 2017 San Francisco | Baron Schwartz
PDF
Data pipelines and anomaly detection
PDF
Defcon 21-pinto-defending-networks-machine-learning by pseudor00t
PDF
Demystifying observability
PPTX
Vissec2014
PPTX
[DrupalCon] Erase Unconscious Bias From Your AI Datasets
Simple math for anomaly detection toufic boubez - metafor software - monito...
SplunkLive! Prelert Session - Extending Splunk with Machine Learning
Influx/Days 2017 San Francisco | Baron Schwartz
Data pipelines and anomaly detection
Defcon 21-pinto-defending-networks-machine-learning by pseudor00t
Demystifying observability
Vissec2014
[DrupalCon] Erase Unconscious Bias From Your AI Datasets

What's hot (8)

PDF
Probabilistic Programming: Why, What, How, When?
PDF
O'Reilly Security New York - Predicting Exploitability Final
PDF
A quest for better sleep
PPTX
Azure machine learning
PDF
Engage 2013 - Leveraging Ad Hoc Analysis
PDF
LOPSA East 2013 - Building a More Effective Monitoring Environment
PDF
Phone addiction
PDF
SANS OUCH Newsletter April 2016
Probabilistic Programming: Why, What, How, When?
O'Reilly Security New York - Predicting Exploitability Final
A quest for better sleep
Azure machine learning
Engage 2013 - Leveraging Ad Hoc Analysis
LOPSA East 2013 - Building a More Effective Monitoring Environment
Phone addiction
SANS OUCH Newsletter April 2016
Ad

Viewers also liked (11)

PPTX
Splunk Dynamic lookup
PPTX
Long Term Reporting with Savvius and Splunk
PDF
SplunkLive! Customer Presentation - Cequint
PPTX
Splunk live university of alberta 2015
PPTX
SplunkLive! Austin Customer Presentation - Dell
PPTX
Splunk Ninjas: New Features, Pivot, and Search Dojo
PDF
SplunkLive! Warsaw 2016 - Machine Learning
PDF
Herbalife Customer Presentation
PPTX
AWS on Splunk, Splunk on AWS
PDF
Molina Healthcare Customer Presentation
PDF
Experian Customer Presentation
Splunk Dynamic lookup
Long Term Reporting with Savvius and Splunk
SplunkLive! Customer Presentation - Cequint
Splunk live university of alberta 2015
SplunkLive! Austin Customer Presentation - Dell
Splunk Ninjas: New Features, Pivot, and Search Dojo
SplunkLive! Warsaw 2016 - Machine Learning
Herbalife Customer Presentation
AWS on Splunk, Splunk on AWS
Molina Healthcare Customer Presentation
Experian Customer Presentation
Ad

Similar to Splunk live! Customer Presentation – Prelert (20)

PDF
Analytics for large-scale time series and event data
PPTX
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
PDF
Anomaly detection Workshop slides
PDF
AI in anomaly detection - An Overview.pdf
PPTX
Machine Learning in Action
PDF
AI in anomaly detection.pdf
PDF
Using Data Science for Cybersecurity
PPTX
Machine Learning in Action
PDF
POSTER_Ewonye.pdf
PDF
Anomaly detection made easy
PDF
Anomaly detection made easy - Piotr Guzik Allegro
PPTX
Anomaly Detection for Security
PDF
1026332_Master_Thesis_Eef_Lemmens_BIS_269.pdf
PPTX
Anomaly Detection and Spark Implementation - Meetup Presentation.pptx
PDF
Anomaly detection
PPTX
Anomaly detection
DOCX
Anomaly detection Full Article
PPTX
A review of machine learning based anomaly detection
PPTX
A review of machine learning based anomaly detection
PDF
An Introduction to Anomaly Detection
Analytics for large-scale time series and event data
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
Anomaly detection Workshop slides
AI in anomaly detection - An Overview.pdf
Machine Learning in Action
AI in anomaly detection.pdf
Using Data Science for Cybersecurity
Machine Learning in Action
POSTER_Ewonye.pdf
Anomaly detection made easy
Anomaly detection made easy - Piotr Guzik Allegro
Anomaly Detection for Security
1026332_Master_Thesis_Eef_Lemmens_BIS_269.pdf
Anomaly Detection and Spark Implementation - Meetup Presentation.pptx
Anomaly detection
Anomaly detection
Anomaly detection Full Article
A review of machine learning based anomaly detection
A review of machine learning based anomaly detection
An Introduction to Anomaly Detection

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
Teaching material agriculture food technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Approach and Philosophy of On baking technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Big Data Technologies - Introduction.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Electronic commerce courselecture one. Pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Teaching material agriculture food technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Approach and Philosophy of On baking technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
Spectroscopy.pptx food analysis technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Big Data Technologies - Introduction.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation_ Review paper, used for researhc scholars
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
MIND Revenue Release Quarter 2 2025 Press Release
Electronic commerce courselecture one. Pdf

Splunk live! Customer Presentation – Prelert

  • 1. Anomaly Detection using Machine Learning Predictive Analytics the anomaly detection company
  • 2. Terminology • Machine-learning  Autonomous self-learning without the assistance of humans (unsupervised learning) • Predictive Analytics  Probabilistic prediction of behavior based upon observed past behavior • Anomaly Detection  what’s “different” or weird” versus what’s “good” or “bad”
  • 4. A: Only What’s Behaving Abnormally 4
  • 5. Anomaly Detection - an Analogy • How could I accurately predict how much Postal-mail you are likely to get delivered to your home tomorrow? • And, how would I know if the amount you received was “abnormal”?
  • 6. A practical methodology would involve… • First, determine what’s normal before I can declare what’s abnormal • Watch your mail delivery volume for a while…  1 day?  1 week?  1 month? • Notice, that you intuitively feel like you’ll gain accuracy in your predictions with more data that you see. • Ideally, use those observations to create a…
  • 7. Probability Distribution Function pieces of mail per day %likelihood(probability)
  • 8. Probability Distribution Function pieces of mail per day %likelihood(probability) Best for my house
  • 9. Probability Distribution Function pieces of mail per day %likelihood(probability) College Student?
  • 10. Probability Distribution Function pieces of mail per day %likelihood(probability) My Mom
  • 11. Finding “what’s unexpected”… Your job is often looking for unexpected change in your environment, either proactively through monitoring or reactively through diagnostics/troubleshooting
  • 12. Using the PDF to Find What is Unexpected pieces of mail per day %likelihood(probability) zero pieces of mail? fifteen pieces of mail?
  • 13. Relate back to IT and Security data • # Pieces of mail = # events of a certain type  Number of failed logins  Number of errors of different types  Number of events with certain status codes  Etc. • Or, performance metrics  Response time  Utilization % => Every kind of data will need its own unique “model” (probability distribution function)
  • 14. Do You Know How to Accurately Model? • Which one(s) models your data best? • You will want to get it right 14 source: “Doing Data Science” O’Neil & Schutt avg +/- 2 stdev assumes Gaussian (Normal) Distribution!
  • 17. Standard Deviations – Not so Good 33,000+ performance metrics analyzed using +/- 2.5σ 0 1000 2000 3000 4000 5000 6000 7000 28 Feb 00:00 28 Feb 12:00 01 Mar 00:00 01 Mar 12:00 02 Mar 00:00 02 Mar 12:00 03 Mar 00:00 03 Mar 12:00 • Never less than 900 alerts per hour • Real outage (circled) overshadowed by ~6000 extraneous alerts Total # Alerts
  • 18. Don’t worry, we have you covered • Prelert uses sophisticated machine-learning techniques to best-fit the right statistical model for your data. • Better models = better outlier detection = less false alarms 20
  • 20. Kinds of Anomalies Detected 22 Deviations in event count vs. time Deviations in values vs. time Rare occurrences of things Population/Peer outliers
  • 21. #1) Deviations in Event Counts/Rates • Use Case: Online Commerce Site  Cyclical online ordering volume (credit cards, etc.)  Service outage on May 10th orders not being processed, dip in afternoon volume 23
  • 22. Hard to automatically detect because… • Tricky to catch with thresholds because overall count didn’t dip below low watermark • Output of Splunk “predict”: 24
  • 23. Prelert finds the anomaly perfectly 25 • No extraneous false alarms • Despite the inherent challenges of the periodic nature of the data
  • 24. #2) Deviations in Performance Metrics • Use Case: Online travel portal • Makes web services calls to airlines for fare quotes • Each airline responds to fare request with its own typical response time (20 airlines): 26
  • 25. Hard to automatically detect because… • Tricky to construct unique thresholds for each airline individually • Cannot do “avg +/- 2σ” because it is too noisy for this kind of data • Splunk’s “predict” doesn’t support explosion out via by clause (“by airline”) 27
  • 26. Prelert finds the anomaly perfectly 28 • Only 1 of the many airlines is having an issue
  • 27. #3) Rare Items as Anomalies • Use Case: Security team @ services company • Wanted to profile typical processes on each host using netstat • Goal was to identify rare processes that “start up and communicate” for each host, individually 29
  • 28. Hard to automatically detect because… • Each host has it’s own separate “set” of typical processes that are potentially unique • i.e. FTP may run routinely run on server A, but never runs on server B • Maintaining a running list of “typical processes” across hundreds of servers not practical • Splunk “rare” command is not truly a rarity measurement, just “least occurring” 30
  • 29. Prelert finds the anomaly perfectly 31 • Finds FTP process running for 3 hours on system that doesn’t normally run FTP
  • 30. #4) Population / Peer Outliers • Use Case: Proxy log data  Need to determine which users/systems are sending out requests/data much differently than the others 32
  • 31. Hard to automatically detect because… • Peer analysis is impossible without Prelert 33
  • 32. Prelert finds the anomaly perfectly 34 • One particular host sending many requests (20,000/hr) to an IIS webserver • This is an attempt to hack the webserver
  • 33. Anomaly Detective App • Free to download and try – 100% native Splunk app • Easy to use – “push button anomaly detection” • More powerful anomaly detection than Splunk on its own • Scalable for big data sets 35 http://goo.gl/KJY9B
  • 34. Bonus – Anomaly Cross-Correlation • Use Case: Retail company with flaky POS application (gift card redemption)  App occasionally disconnects from DB  Team suspects either a DB or a network problem, but hard to find cause • Prelert configured to run anomaly detection across 3 data types simultaneously  App logs (unstructured) – count by dynamic message type  SQL Server performance metrics  Network performance metrics 36
  • 35. Result: Instant Answers 37 Symptom: Sudden influx of DB errors in log Symptom: Drop in SQL Server client connections Cause: Network spike and TCP discards

Editor's Notes

  • #2: [no audio here]
  • #17: Probability of data comes in all shapes and sizes – rarely does it fit a nice bell curve
  • #25: index="invite" | timechart span=1h count as mycount | predict mycount | rename upper95(prediction(mycount)) as ceiling | rename lower95(prediction(mycount)) as floor | eval alarm1=if(mycount > ceiling, "10000", "0") | eval alarm2=if(mycount < floor, "-10000", "0") | table _time,alarm1,alarm2,mycount,ceiling,floor
  • #29: Prelert has users analyzing 100,000+ simultaneous unique metrics, not just 20!