HIDS 3911

From Atomicorp Wiki
Jump to: navigation, search

Rule ID



Active rule currently published.


This rule detects multiple login connections to the Courier IMAP and POP3 servers from the same IP. The intent of this rule is to detect a malicious party attempting a denial of service attack, or attempting to brute force guess passwords. (Please see the Similar Rules section at the bottom)

The default settings are to detect 30 login connections in 20 seconds.

Note: This rule does not block by default, it just alerts when this occurs.

False Positives

This rule can be falsely triggered if multiple users are using the same IP address, such as behind a firewall and multiple users trigger more than 30 login connections in 20 seconds. This can happen either with a large number of users, or an email client that can generate multiple connections at the same time (as with the IMAPX protocol).

If you believe that this is a false positive, then disable this rule or whitelist the source IP.

Tuning Recommendations


Similar Rules




Personal tools