Security Log Analysis: August 2017



I was just watching some server logs and decided to pull some statistics on common attacks from Snort and Bro.



This first one is SSH bruteforce attempts.





Here are the most commonly attempted usernames:





Here are the most common IDS alerts at Priority 2.





These are the most common source countries for IDS attacks.





And here are the 10 least common issues captured by Bro.





I also have live alerts set up for several types of event, such as bruteforce attempts against services, access to honey content, etc.



Knowledge of what’s happening on your servers is crucial to both defense and general curiosity.



If you’re not collecting data from your servers for edification purposes, you’re missing out on a rich stream of opportunities to learn about a great many things. Who’s attacking you, how, what they’re attacking, how common tools work, etc.



Capture, Watch, Improve.


__


I do a weekly show called Unsupervised Learning, where I curate the most interesting stories in infosec, technology, and humans, and talk about why they matter. You can subscribe here.




A DNS Primer
The Simple, Effective Way to Track What’s Said About You on the Internet
Information Security Concepts
Ideas
My RSA 2017 Recap
 •  0 comments  •  flag
Share on Twitter
Published on August 19, 2017 08:57
No comments have been added yet.


Daniel Miessler's Blog

Daniel Miessler
Daniel Miessler isn't a Goodreads Author (yet), but they do have a blog, so here are some recent posts imported from their feed.
Follow Daniel Miessler's blog with rss.