Suricata high number of requests detected from single IP address

This rule is part of a beta feature. To learn more, contact Support.

Set up the suricata integration.

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect an unusually high number of requests are made from a single IP address, which could indicate a potential brute force attack, Denial-of-Service (DoS) attempt, or other malicious activities aimed at overwhelming or exploiting the server.

Strategy

Monitor Suricata logs where a single IP address generates a high number of requests within a short period. This detection rule aims to identify potential threats early, allowing for timely investigation and mitigation to protect server resources and maintain service availability.

Triage and response

  1. Analyse the pattern and volume of requests to distinguish between legitimate traffic and potential attacks.
  2. Investigate the source IP {{@network.client.ip}} address to determine if the activity is malicious.
  3. Implement immediate measures to block or limit the impact of the suspicious activity if confirmed as a threat.
PREVIEWING: rtrieu/product-analytics-ui-changes