The AIShield is an AI-security product designed to protect AI-powered devices in the face of emerging security threats such as Model Extraction, Evasion, Data Poisoning, and Model Inference attacks. AIShield provides automated hacker-level vulnerability analysis and endpoint protection to harden the systems against emerging AI-security threats. AIShield provided Threat Informed Endpoint Defense that integrates with Splunk Enterprise, Splunk Cloud, and Splunk Enterprise Security to deliver enhanced real-time monitoring capabilities to security teams for their AI assets, giving them insights into AI security incidents.
This app contains helpful security alerts and dashboards.
Users will have to leverage AIShield product to scan their AI model for vulnerabilities and generate Threat Informed Endpoint Defense capable of integrating with Splunk Enterprise,Splunk Cloud and Splunk Enterprise Secuirty. To complete this step, please get in touch with AIShield.Contact@bosch.com
Please refer installation instructions links for Splunk Cloud and Splunk Enterprise to install AIShield AI Security Monitoring App for Splunk.
Once the application has been installed please follow the steps below to configure the application.
Pre-requisite : Follow the instruction to create an custom index.
Settings
> Data Input
.HTTP Event Collector
token with a name of your choice.indexer acknowledgement
is not enabled.<your_index_name>
index<your_index_name>
.Note: If you choose any other index, use the same while creating HEC token and updating the macro in the app. Follow the steps to set the macro to whatever index you have saved the data to as part of the HEC definition.
1. Navigate to Settings
--> Advanced Search
2. Click on Search macro
--> default_index
macro
3. Update index value 'aishield_index' to whatever index you have saved. : index="<your_index_name>"
4. Click on save button
After successful integration, AIShield provided Threat Informed Endpoint Defense will send logs to Splunk Enterprise or Splunk Cloud, Navigate to Activity
--> Triggered alerts
to see alerts.
No data displayed?
1) While sending logs from AIShield provided Threat Informed Endpoint Defense, please make ensure that sourcetype is set with a name of 'AIShield'.
For any issues with this app, please send an email to AIShield.Contact@bosch.com.
Removed the "install_source_checksum" from the app.config file.(compatibility with the Splunk Cloud Platform)
Initial release
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.