Route data to multiple destinations
Enrich data events with business or service context
Search and analyze data directly at its source, an S3 bucket, or Cribl Lake
Reduce the size of data
Shape data to optimize its value
Store data in S3 buckets or Cribl Lake
Replay data from low-cost storage
Collect logs and metrics from host devices
Centrally receive and route telemetry to all your tools
Redact or mask sensitive data
Optimize data for better threat detection and response
Streamline infrastructure to reduce complexity and cost
Simplify Kubernetes data collection
Optimize logs for value
Control how telemetry is stored
Easily handle new cloud telemetry
Ensure freedom in your tech stack
Accelerate the value of AIOps
Effortlessly search, collect, process, route and store telemetry from every corner of your infrastructure—in the cloud, on-premises, or both—with Cribl. Try the Cribl Suite of products today.
Learn moreGet telemetry data from anywhere to anywhere
Get started quickly without managing infrastructure
Streamline collection with a scalable, vendor-neutral agent
AI-powered tools designed to maximize productivity
Easily access and explore telemetry from anywhere, anytime
Instrument, collect, observe
Store, access, and replay telemetry.
Get hands-on support from Cribl experts to quickly deploy and optimize Cribl solutions for your unique data environment.
Work with certified partners to get up and running fast. Access expert-level support and get guidance on your data strategy.
Get inspired by how our customers are innovating IT, security, and observability. They inspire us daily!
Read customer storiesFREE training and certs for data pros
Log in or sign up to start learning
Step-by-step guidance and best practices
Tutorials for Sandboxes & Cribl.Cloud
Ask questions and share user experiences
Troubleshooting tips, and Q&A archive
The latest software features and updates
Get older versions of Cribl software
For registered licensed customers
Advice throughout your Cribl journey
Connect with Cribl partners to transform your data and drive real results.
Join the Cribl Partner Program for resources to boost success.
Log in to the Cribl Partner Portal for the latest resources, tools, and updates.
Our Criblpedia glossary pages provide explanations to technical and industry-specific terms, offering valuable high-level introduction to these concepts.
Anomaly detection is the process of identifying events, items, or observations that deviate significantly from typical patterns or behaviors. These anomalies, often termed outliers, novelties, or exceptions, play a critical role in many domains, including network security.
In network anomaly detection and intrusion detection, anomalies—also called “interesting events”—aren’t necessarily rare but are unusual occurrences like sudden surges in activity. While traditional statistical methods may overlook such spikes, advanced techniques like cluster analysis can detect subtle patterns and microclusters, improving detection accuracy.
Anomalies can be classified into two primary categories: unintentional and intentional.
Types of Anomalies:
Anomaly detection techniques can be categorized into three primary types: unsupervised, semi-supervised, and supervised. The choice of the appropriate method depends on the availability of labels in the dataset. Let’s break them down:
Supervised Anomaly Detection
This approach requires a dataset with a complete set of “normal” and “abnormal” labels for a classification algorithm to operate effectively. Training is a key aspect of anomaly detection, akin to conventional pattern recognition. However, this method must deal with a significant class imbalance. As a result, not all statistical classification algorithms are well-suited to address this inherent imbalance in the process.
Semi-Supervised Anomaly Detection
Semi-supervised methods leverage a labeled training dataset representing normal behavior to create a model. This model is then employed to detect anomalies by assessing how likely the model is to generate any encountered instance.
Unsupervised Anomaly Detection
Unsupervised methods identify anomalies in an unlabeled test dataset solely based on the intrinsic properties of the data. The underlying assumption is that, in most cases, the majority of instances in the dataset are normal. Anomaly detection algorithms identify instances that show the least congruence with the rest of the dataset.
The wide array of techniques caters to the diverse needs and challenges of anomaly detection. These techniques encompass generative and discriminative approaches and include clustering-based, density-based, and support vector machine-based methods. Selecting the most appropriate technique depends on the specific use case and characteristics of the dataset. Anomalies can be expressed in diverse forms, requiring customized approaches for detection and mitigation.
Anomaly detection can be effectively implemented with Cribl Stream and Cribl Edge by optimizing how data is processed before it reaches monitoring or SIEM systems. Cribl helps streamline the data pipeline by filtering out irrelevant data, normalizing and enriching logs, and routing critical information in real time. This enables the downstream analytics and anomaly detection tools to focus on high-quality, contextualized data, improving the accuracy and efficiency of identifying anomalies such as abnormal behaviors, trends, or security threats.
Cribl Search enhances anomaly detection by providing powerful, flexible search capabilities across distributed data stores without moving the data. With Cribl Search, teams can query and analyze large datasets in real time, whether the data resides in the cloud or on-premises. It enables efficient anomaly detection by allowing security teams to identify patterns, investigate suspicious activity, and respond to threats quickly. Cribl Search leverages observability data, logs, and metrics to facilitate in-depth analysis, helping organizations proactively detect and mitigate anomalies across their environments.
Classic choice. Sadly, our website is designed for all modern supported browsers like Edge, Chrome, Firefox, and Safari
Got one of those handy?