Docs
test1test2
6.5
6.5
  • ElastiFlow Documentation
  • Unified Flow Collector
    • General Configuration
    • Changelog
    • Maxmind GeoIP2 and GeoLite2
    • RiskIQ PassiveTotal
    • Network Interfaces
    • User-Defined Metadata
    • Docker
    • Linux
    • Unified Flow Collector Introduction
    • System Requirements
    • Supported IEs
    • AWS VPC Flow Log IEs
    • IPFIX IEs
    • Netflow IEs
    • sFlow IEs
  • Unified SNMP Collector
    • Device Groups
    • Changelog
    • Devices
    • Downloading Definitions
    • Enumerations
    • Objects
    • Object Groups
    • User-Defined Metadata
    • Docker
    • Network Interfaces
    • United SNMP Collector Introduction
    • Linux
    • Scheduling Rediscovery
  • Monitoring ElastiFlow
    • Liveness & Readiness
    • Metrics
    • Prometheus & Grafana
  • Configuration Reference
    • YAML Configuration Files
    • Configuration Reference Overview
    • Common
      • API
      • Licensing
      • Overview
      • Logging
      • HTTP output
      • Elasticsearch output
      • Kafka output
      • Monitor output
      • OpenSearch output
      • Splunk output
      • stdout output
      • Processor
    • Unified Flow Collector
      • Overview
      • Community/Conversation IDs
      • EF_PROCESSOR_ENRICH_TOTALS_IF_NO_DELTAS
      • Overview
      • RiskIQ PassiveTotal
      • Maxmind
      • User-Defined Metadata
      • Overview
      • Overview
      • User-Defined Metadata
      • Overview
      • Benchmark Input
      • Netflow/IPFIX/sFlow (UDP)
      • Licensing
      • Decoder/Processor
      • Sample Rate
      • Configuration Changes
    • Unified SNMP Collector
      • User-Defined Metadata
      • Overview
      • Licensing
      • SNMP Poller
      • EF_PROCESSOR_SNMP_ENUM_DEFINITIONS_DIRECTORY_PATH
  • API Reference
    • API Reference Overview
    • SNMP Operations
  • Data Platforms
    • Elastic
      • Basic Cluster
      • Advanced Cluster
      • Single Server
      • Multi-Tier Cluster
      • Single "Lab" Server
      • Elasticsearch
      • ElastiFlow vs. Filebeat and Logstash
      • RHEL/CentOS
      • Ubuntu/Debian
      • Kibana
      • ML
        • Network Security
        • Machine Learning
        • Availability
          • Network Availability
          • DHCP
          • LDAP
          • DNS
          • NTP
          • RADIUS
          • TCP Sessions
        • Network Security Activity
          • Rare Autonomous System
          • Network Activity
          • Rare Conversation
          • Rare Geolocation
        • Network Security Brute Force
          • Brute Force CLI Access
          • Brute Force Remote Desktop Access
          • Brute Force Attacks
        • Network Security DDoS
          • Denial-of-Service
          • ICMP Flood Attack
          • SYN Flood Attack
          • TCP DDoS Attack
          • UDP Amplification Attack
        • Network Security Recon
          • ICMP Scan
          • Reconnaissance
          • Port Scan
        • Performance
          • Unusual ASN Traffic Volume
          • Unusual Network Interface Traffic Volume
          • Network Performance
    • Opensearch
      • Dashboards
      • Auth Sig V4
    • Splunk
      • Default Search Macro
      • Configuring Data Input & Index
      • Splunk App Installation
    • Output Configuration
  • Additional Guides
    • Catalyst (sFlow)
    • FortiGate
    • hsflowd
    • Configuring Flow Sampling on Juniper Routers
    • Junos OS (sFlow)
    • MikroTik RouterOS
    • OpenWRT (softflowd)
    • Ubiquiti EdgeRouter
    • SonicWall
    • Junos OS
    • Extending SNMP Device Support
    • Flow Device Support Overview
    • SNMP Device Support Overview
    • Generating A Support Bundle
  • FAQ
    • Flows stopped showing up in Kibana (Disk(s) Full)
    • Common reasons why you have discrepancies between ElastiFlow data & reality
    • What Are Snapshots?
    • Importing the wrong dashboards (No data)
  • Knowledge Base
    • Config
      • Elasticsearch Authentication Failure
      • CA Certificate Path Incorrect
      • license/error Invalid Segments
    • Flow
      • Bidirectional Flow Support
      • Configure the UDP Input
      • Flow Records Not Received
      • Netflow v9/IPFIX Template Not Receieved
      • Unsupported sFlow Structures
    • General
      • License Has Expired
      • License Agreement Not Accepted
    • Install
      • .deb Upgrade Fails File Overwrite
    • Operation
      • Flow Collector Queues 90% Full
      • Dashboard Updates
      • Change elastiflow-* Index Name?
  • Elastic Stack Deployment
  • Download Links
Powered by GitBook
On this page
  • Attributes
  • Downloads
  1. Data Platforms
  2. Elastic
  3. ML
  4. Network Security Brute Force

Brute Force CLI Access

Identifying brute force Command Line Interface (CLI) access attempts, particularly through protocols like SSH (Secure Shell) and telnet, is crucial in safeguarding network security. Brute force attacks involve repeated attempts to guess login credentials and gain unauthorized access to systems. These attacks pose a significant threat as they can lead to compromised systems, data breaches, and unauthorized control over critical network resources. In the context of SSH and telnet, which are commonly used for secure administrative access to devices and servers, detecting brute force attempts is paramount. Early detection allows network administrators to implement countermeasures, such as blocking malicious IP addresses, enforcing strong password policies, or setting up additional authentication mechanisms, thereby mitigating potential security risks.

ElastiFlow provides a collection of anomaly detection jobs designed to identify brute force CLI access attempts through SSH and telnet including several targeted monitoring and analysis strategies.

Attributes

Attribute
Information

Analysis Type

population

MITRE ATT&CK Technique

MITRE ATT&CK Sub-Technique

MITRE ATT&CK Tactic

Downloads

Schema
Vector
Perspective
Window
Link

CODEX

direct

edge

fast

CODEX

direct

edge

slow

CODEX

direct

inbound

fast

CODEX

direct

inbound

slow

CODEX

direct

outbound

fast

CODEX

direct

outbound

slow

CODEX

direct

private

fast

CODEX

direct

private

slow

CODEX

distributed

edge

fast

CODEX

distributed

edge

slow

CODEX

distributed

inbound

fast

CODEX

distributed

inbound

slow

CODEX

distributed

outbound

fast

CODEX

distributed

outbound

slow

CODEX

distributed

private

fast

CODEX

distributed

private

slow

ECS

direct

edge

fast

ECS

direct

edge

slow

ECS

direct

inbound

fast

ECS

direct

inbound

slow

ECS

direct

outbound

fast

ECS

direct

outbound

slow

ECS

direct

private

fast

ECS

direct

private

slow

ECS

distributed

edge

fast

ECS

distributed

edge

slow

ECS

distributed

inbound

fast

ECS

distributed

inbound

slow

ECS

distributed

outbound

fast

ECS

distributed

outbound

slow

ECS

distributed

private

fast

ECS

distributed

private

slow

By deploying this suite of anomaly detection jobs, organizations can effectively monitor for and rapidly identify brute force access attempts on SSH and telnet interfaces. Prompt detection is essential for taking immediate action to secure the network against unauthorized access, ensuring the protection of sensitive data and the integrity of network operations. This proactive approach to network security is a critical aspect of modern network management in an increasingly connected and security-conscious digital environment.

PreviousNetwork Security Brute ForceNextBrute Force Remote Desktop Access

Brute Force (T1110)
Password Guessing (T1110.001)
Credential Access (TA0006)
elastiflow_codex_netsec_bruteforce_direct_cli_edge_fast
elastiflow_codex_netsec_bruteforce_direct_cli_edge_slow
elastiflow_codex_netsec_bruteforce_direct_cli_in_fast
elastiflow_codex_netsec_bruteforce_direct_cli_in_slow
elastiflow_codex_netsec_bruteforce_direct_cli_out_fast
elastiflow_codex_netsec_bruteforce_direct_cli_out_slow
elastiflow_codex_netsec_bruteforce_direct_cli_priv_fast
elastiflow_codex_netsec_bruteforce_direct_cli_priv_slow
elastiflow_codex_netsec_bruteforce_distrib_cli_edge_fast
elastiflow_codex_netsec_bruteforce_distrib_cli_edge_slow
elastiflow_codex_netsec_bruteforce_distrib_cli_in_fast
elastiflow_codex_netsec_bruteforce_distrib_cli_in_slow
elastiflow_codex_netsec_bruteforce_distrib_cli_out_fast
elastiflow_codex_netsec_bruteforce_distrib_cli_out_slow
elastiflow_codex_netsec_bruteforce_distrib_cli_priv_fast
elastiflow_codex_netsec_bruteforce_distrib_cli_priv_slow
elastiflow_ecs_netsec_bruteforce_direct_cli_edge_fast
elastiflow_ecs_netsec_bruteforce_direct_cli_edge_slow
elastiflow_ecs_netsec_bruteforce_direct_cli_in_fast
elastiflow_ecs_netsec_bruteforce_direct_cli_in_slow
elastiflow_ecs_netsec_bruteforce_direct_cli_out_fast
elastiflow_ecs_netsec_bruteforce_direct_cli_out_slow
elastiflow_ecs_netsec_bruteforce_direct_cli_priv_fast
elastiflow_ecs_netsec_bruteforce_direct_cli_priv_slow
elastiflow_ecs_netsec_bruteforce_distrib_cli_edge_fast
elastiflow_ecs_netsec_bruteforce_distrib_cli_edge_slow
elastiflow_ecs_netsec_bruteforce_distrib_cli_in_fast
elastiflow_ecs_netsec_bruteforce_distrib_cli_in_slow
elastiflow_ecs_netsec_bruteforce_distrib_cli_out_fast
elastiflow_ecs_netsec_bruteforce_distrib_cli_out_slow
elastiflow_ecs_netsec_bruteforce_distrib_cli_priv_fast
elastiflow_ecs_netsec_bruteforce_distrib_cli_priv_slow