Brute Force

Last updated on:

About the rule

Rule Type

Advanced

Rule Description

Detects many authentication failures from one source to one destination which is may indicate Brute Force activity

Severity

Critical

Rule Requirement

Criteria

Action1: actionname = "null" | timewindow 2m | groupby HOSTTYPE | groupby HOSTNAME having COUNT > 10 Action2: actionname = "successful_logon" AND HOSTTYPE = Action1.HOSTTYPE AND HOSTNAME = Action1.HOSTNAME sequence:Action1 followedby Action2 within 1m select Action2.MESSAGE,Action2.HOSTTYPE,Action2.HOSTNAME,Action2.REMOTEHOST,Action2.USERNAME

Detection

Execution Mode

realtime

Log Sources

Miscellaneous

Author

Aleksandr Akhremchik, oscd.community