Suricata high number of requests detected from single IP address
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Detect an unusually high number of requests are made from a single IP address, which could indicate a potential brute force attack, Denial-of-Service (DoS) attempt, or other malicious activities aimed at overwhelming or exploiting the server.
Strategy
Monitor Suricata logs where a single IP address generates a high number of requests within a short period. This detection rule aims to identify potential threats early, allowing for timely investigation and mitigation to protect server resources and maintain service availability.
Triage and response
- Analyse the pattern and volume of requests to distinguish between legitimate traffic and potential attacks.
- Investigate the source IP
{{@network.client.ip}}
address to determine if the activity is malicious. - Implement immediate measures to block or limit the impact of the suspicious activity if confirmed as a threat.