PingFederate Audit Alert: multiple failed authentication attempts in a short time period

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect an unusually high number of failed authentication attempts in a short time period.

Strategy

Monitor PingFederate logs where a user generates a high number of failed authentication attempts within a short period. This detection rule aims to identify potential threats early, allowing for timely investigation and mitigation to protect server resources and maintain service availability.

Triage and response

  1. Analyze the pattern and volume of requests to distinguish between legitimate traffic and potential attacks.
  2. Investigate the IP {{@network.client.ip}} to determine if the activity is malicious.
  3. Implement immediate measures to block or limit the impact of the suspicious activity if confirmed as a threat.