Brute force Login Detection

Goal

Detects large spikes of failed user logins that could indicate a potential brute-force attack being performed by a threat actor. To achieve this we learn the usual failed login attempts for a user.

Description

This is based on a simple statistical method to compute the normal behaviour for each user. This means to control the normal amount of failed logins for every user.

With that info, we produce an alert when there is a large deviation from normal behaviour.

Characteristics

Name
Brute force Login Detection

Data involved

VPN events. Currently it is working on SonicWall devices.

Alert Generation

Only produces high severity alerts.

Raw outputs of the model

A boolean value that indicates if we have to produce the alert.

Last updated