{{indexmenu_n>4}} ====== Detecting SSH bruteforce attacks using triggers in QoE ====== [[dpi:qoe_analytics:qoe_gui:offline_analytics:triggers_and_notifications|Triggers]] are used to search data in QoE Stor by specified parameters. When a trigger fires, one of the following actions can occur: * notification in GUI * HTTP action * email delivery \\ Required SSG DPI options: * [[dpi:dpi_options:opt_statistics]] * [[dpi:dpi_options:opt_notify]] Required additional modules: * [[dpi:dpi_components:dpiui|]] * [[dpi:qoe_analytics:implementation_administration|]] ===== System trigger for detecting SSH bruteforce attacks ===== The trigger for detecting SSH bruteforce attacks (name — "ssh bruteforce") is a system trigger and is available in "QoE analytics" → "Triggers and notifications" (disabled by default). {{ :dpi:qoe:use_cases:dpiui2_triggers_bruteforce.png?nolink&600 |}} === General trigger information === {{ :dpi:qoe:use_cases:dpiui2_triggers_bruteforce_common.png?nolink&600 |}} * Trigger name: "ssh bruteforce"; * Days of week — all; * Check frequency — 10 minutes; * Trigger activation frequency — 0; * Start/end dates and times can be set if needed. Every day, a check will be performed every 10 minutes according to the conditions described below. === Queries === {{ :dpi:qoe:use_cases:dpiui2_triggers_bruteforce_queries.png?nolink&600 |}} For this trigger a non-editable query is preset with the following parameters: * Table to scan: Raw full netflow → Tables → Attacks detection → Ssh bruteforce; * Period from: now - 30 minutes * Period to: now - 20 minutes === Conditions === {{ :dpi:qoe:use_cases:dpiui2_triggers_bruteforce_conditions.png?600 |}} * Add two "+" fields * Link – AND * Function – avg * Series in field 1 – session lifetime to subscriber <= 20 (ms) * Series in field 2 – number of sessions per subscriber >= 1500 We set the trigger conditions: average duration of SSH sessions to a subscriber is less than 20 ms and the number of SSH sessions for the subscriber is greater than 1500 for the analyzed period. === Error handling === {{ :dpi:qoe:use_cases:ddos_error.png?nolink&600 |}} * In "If no errors" — no data * In "If error or timeout" — save last state With this configuration, if there are no errors, no data is saved; if errors occur, information about suspicious activity is saved. === Actions === == E-mail action == {{ :dpi:qoe:use_cases:ddos_email.png?nolink&600 |}} * Click the "" icon to auto-fill the form * In the "To" field — specify the email address * With this setup, when the trigger fires an email with the notification details (ID, trigger name, status, link to the report — saved state) will be sent to the specified address == Notification == {{ :dpi:qoe:use_cases:ddos_notification.png?nolink&600 |}} * Click "" to auto-fill the form * Select notification type — "Warning" * This will create a notification in the SSG system {{ :dpi:qoe:use_cases:dpiui2_triggers_bruteforce_alerting.png?nolink&600 |}} You can get a link to the report via the notifications menu {{ :dpi:qoe:use_cases:dpiui2_triggers_bruteforce_notofication.png?nolink&400 |}} Select the notification Choose — "Details" {{ :dpi:qoe:use_cases:dpiui2_triggers_bruteforce_notofication_details.png?nolink&400 |}} Follow the report link — the report will open in a new browser window. == HTTP action == {{ :dpi:qoe:use_cases:ddos_http.png?nolink&600 |}} Click "" to auto-fill the form. Choose the method most suitable for your ticket system and enter the URL. Keep in mind — the numeric thresholds for sessions, incoming packets, etc., are given as averaged examples. Fine-tune thresholds based on your network specifics.