Web Fraud - Anomalous User Clickspeed

Original Source: [splunk source]
Name:Web Fraud - Anomalous User Clickspeed
id:31337bbb-bc22-4752-b599-ef192df2dc7a
version:3
date:2024-10-17
author:Jim Apger, Splunk
status:deprecated
type:Anomaly
Description:This search is used to examine web sessions to identify those where the clicks are occurring too quickly for a human or are occurring with a near-perfect cadence (high periodicity or low standard deviation), resembling a script driven session.
Data_source:
search:`stream_http` http_content_type=text*
| rex field=cookie "form_key=(?<session_id>\w+)"
| streamstats window=2 current=1 range(_time) as TimeDelta by session_id
| where TimeDelta>0 |stats count stdev(TimeDelta) as ClickSpeedStdDev avg(TimeDelta) as ClickSpeedAvg by session_id
| where count>5 AND (ClickSpeedStdDev<.5 OR ClickSpeedAvg<.5)
| `web_fraud___anomalous_user_clickspeed_filter`


how_to_implement:Start with a dataset that allows you to see clickstream data for each user click on the website. That data must have a time stamp and must contain a reference to the session identifier being used by the website. This ties the clicks together into clickstreams. This value is usually found in the http cookie. With a bit of tuning, a version of this search could be used in high-volume scenarios, such as scraping, crawling, application DDOS, credit-card testing, account takeover, etc. Common data sources used for this detection are customized Apache logs, customized IIS, and Splunk Stream.
known_false_positives:As is common with many fraud-related searches, we are usually looking to attribute risk or synthesize relevant context with loosly written detections that simply detect anamoluous behavior.
References:
  -https://en.wikipedia.org/wiki/Session_ID
  -https://en.wikipedia.org/wiki/Session_(computer_science)
  -https://en.wikipedia.org/wiki/HTTP_cookie
  -https://splunkbase.splunk.com/app/1809/
drilldown_searches:
  :
tags:
  analytic_story:
    - 'Web Fraud Detection'
  asset_type:Account
  confidence:50
  impact:50
  message:tbd
  mitre_attack_id:
    - 'T1078'
  observable:
    name:'session_id'
    type:'User'
    - role:
      - 'Victim'
  product:
    - 'Splunk Enterprise'
    - 'Splunk Enterprise Security'
    - 'Splunk Cloud'
  required_fields:
    - '_time'
    - 'http_content_type'
    - 'cookie'
  risk_score:25
  security_domain:threat

tests:
  :
manual_test:None

Related Analytic Stories


Web Fraud Detection