Skip to content

Gap & Burst Analysis

Gap and burst analysis help you identify temporal anomalies in your timeline — periods of unusual inactivity or suspicious spikes of activity.

Event Burst Detection showing 9 detected bursts with event rate over time chart and burst multipliers

Gap Analysis

What It Detects

Gap analysis identifies periods where no events were recorded, which may indicate:

  • Log tampering — attacker cleared or stopped logging
  • System downtime — host was offline
  • Collection gaps — incomplete log collection
  • Normal idle periods — after-hours quiet time

How to Use

  1. Open Tools > Gap Analysis
  2. Select the timestamp column to analyze
  3. Set the gap threshold — minimum duration to consider as a gap
PresetDuration
15 minShort gaps — quick service restarts
30 minMedium gaps
60 minDefault — standard activity gaps
2 hoursExtended gaps
8 hoursLong gaps — overnight or weekend
CustomAny minute value

How It Works

  1. Events are bucketed by minute using extract_datetime_minute() in SQL
  2. Minute-level buckets are grouped into sessions — continuous sequences of activity without exceeding the gap threshold
  3. Silence periods between sessions that exceed the threshold are reported as gaps
  4. No in-memory sorting required — SQLite handles the ordering

Results

Summary cards display three metrics:

  • Sessions — number of distinct activity periods detected
  • Gaps — number of silence periods exceeding the threshold
  • Total events — events in the filtered dataset

Sessions list shows each activity period with:

  • Session index badge with color coding (cycles through 8 colors)
  • Time range (from → to)
  • Event count within the session
  • Duration

Gaps list shows each quiet period with:

  • Pause icon
  • Time range (last event before → first event after)
  • Duration in minutes/hours

Click to Zoom

Click any session or gap row to zoom the main grid's date range filter to that time window. Timestamps are converted to second-level precision for accurate filtering.

Tag Sessions

Click Tag Sessions to auto-tag all events within each session. Tags are named Session 1, Session 2, etc. and assigned distinct colors from an 8-color palette. A confirmation shows the total rows tagged across all sessions.

Investigation Tips

Compare Sources

Run gap analysis on individual log sources (filter by channel/source first). A gap in Security logs while System logs continue recording is a strong indicator of log tampering.

Correlate with Activity

Check what happened immediately before and after each gap. If the pre-gap event is suspicious (e.g., service stop, audit policy change), investigate further.

Burst Analysis

What It Detects

Burst analysis identifies abnormal spikes in event volume that stand out from the baseline activity. Spikes may indicate:

  • Brute force attacks — rapid authentication attempts
  • Data exfiltration — high-volume file access
  • Automated tools — scripts or malware generating many events
  • Lateral movement — rapid logon events across systems

How to Use

  1. Open Tools > Burst Detection
  2. Select the timestamp column to analyze
  3. Configure the detection parameters:

Window size — aggregation interval:

PresetBest For
1 minPrecise spike detection
5 minDefault — general burst detection
15 minBroader activity windows
30 minExtended patterns
1 hourCoarse-grained analysis
CustomAny minute value

Threshold multiplier — how many times above baseline qualifies as a burst:

PresetSensitivity
High sensitivity — more bursts detected
Default — balanced detection
10×Low sensitivity — only major spikes
20×Very low — extreme anomalies only
CustomAny value (step 0.5)

How It Works

The algorithm runs in six steps:

  1. Minute bucketing — events grouped by minute using SQL
  2. Window aggregation — minute buckets combined into windows of the configured size. For 1-minute windows, minute buckets are used directly
  3. Median baseline — the median event count across all windows becomes the baseline (minimum 1 to avoid division by zero)
  4. Threshold calculationbaseline × multiplier sets the burst threshold
  5. Burst detection and merging — windows exceeding the threshold are flagged, and adjacent burst windows are merged into contiguous burst periods
  6. Sparkline generation — all windows mapped to {timestamp, count, isBurst} for visualization

Results

Summary cards display four metrics:

  • Bursts — number of burst periods detected (highlighted red if any found)
  • Baseline — median events per window period
  • Peak rate — maximum events in any single window
  • Total events — events in the filtered dataset

Sparkline chart shows event density across the entire timeline:

  • Red bars for burst windows, blue bars for normal windows
  • Red dashed horizontal line at the threshold level
  • Labels showing earliest timestamp, threshold value, and latest timestamp

Bursts list shows each detected burst with:

  • Red "Burst N" badge
  • Time range (from → to)
  • Event count
  • Burst factor (e.g., ×4.2) — ratio of burst activity to baseline
  • Duration

Click to Zoom

Click any burst row to zoom the main grid's date range filter to that burst window.

Tag Bursts

Click Tag Bursts to auto-tag all events within each burst period. Tags are named Burst 1, Burst 2, etc. and assigned colors from a red-heavy 8-color palette. A confirmation shows the total rows tagged.

Filter Awareness

Both gap and burst analysis respect all active filters — column filters, checkbox filters, search terms, date range filters, advanced filters, and bookmark filters. This lets you narrow your timeline before analysis, for example filtering to authentication events only and then looking for brute force bursts.

Investigation Tips

Narrow the Window

Start with a larger window (15–30 min) to find general areas of interest, then narrow to 1–5 minutes for precise spike identification.

Filter First

Apply filters before running burst analysis. For example, filter to authentication events only and then look for bursts to find brute force attempts.

Cross-Reference

After identifying a burst, click to zoom into that time range and examine the individual events. Look for repeated patterns — same source, same target, same event type.

Built for the DFIR community.