Detecting SSH bruteforce attacks using triggers in QoE

Triggers are used to search for data in the QoE Stor by specified parameters. After the trigger action one of the following steps is possible:


The required options of the Stingray Service Gateway:

Required additional modules:

System trigger to detect SSH bruteforce attacks

Trigger to detect SSH bruteforce attacks (Name - "ssh bruteforce") is a system trigger and is available in the subsection "QoE Analytics" - "Triggers and Notifications" (disabled by default).

General trigger information

Every day at intervals of 10 minutes the data will be checked under the conditions described below.

Queries

For this trigger, an uneditable query with the following parameters is set:

Conditions

We set the conditions for the trigger action: The average duration of an SSH-session to a subscriber is less than 20ms and the number of SSH-sessions for the subscriber is more than 1500 in the processed time period.

Errors processing

In this configuration, if there are no errors, the data will not be saved, if there are errors - the information about the suspicious activity will be saved.

Actions

E-mail

Notification

You can get a link to the report in the notification menu

Choose the notification Click "Details"

Click on the link to the report - the report will open in a new browser tab.

HTTP action