Asana brute force attempt
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Identify cases where there is a high number of failed login attempts followed by a successful login. This behavior can indicate a brute-force attack or an unauthorized access attempt.
Strategy
This rule monitors failed login attempts followed by a successful login, raising an alert if the count surpasses the threshold.
Triage and response
- Review logs to identify the account
{{@usr.email}}
associated with the failed login attempts. - Examine the IP addresses and locations (
{{@network.client.ip}}
, {{@network.client.geoip.city.name}}
, {{@network.client.geoip.country.name}}
) associated with the failed attempts to identify any unusual access patterns. - Determine if the login attempts are clustered within a short period or if they follow a gradual pattern, as this can help distinguish between brute-force and accidental lockouts.
- Investigate if there are any ongoing system issues or maintenance activities that could account for increased login failures.
- If suspicious behavior is detected, consider locking the affected accounts, notifying users, and requiring additional authentication steps.