Difference between revisions of "HIDS 3911"
m |
|||
(One intermediate revision by one user not shown) | |||
Line 12: | Line 12: | ||
The default settings are to detect 30 login connections in 20 seconds. | The default settings are to detect 30 login connections in 20 seconds. | ||
+ | |||
+ | '''Note: This rule does not block by default, it just alerts when this occurs.''' | ||
'''False Positives''' | '''False Positives''' | ||
Line 26: | Line 28: | ||
[[HIDS_3910]] | [[HIDS_3910]] | ||
+ | |||
+ | [[HIDS_3912]] | ||
+ | |||
+ | [[HIDS_3913]] |
Latest revision as of 17:07, 7 April 2014
Rule ID
3911
Status
Active rule currently published.
Description
This rule detects multiple login connections to the Courier IMAP and POP3 servers from the same IP. The intent of this rule is to detect a malicious party attempting a denial of service attack, or attempting to brute force guess passwords. (Please see the Similar Rules section at the bottom)
The default settings are to detect 30 login connections in 20 seconds.
Note: This rule does not block by default, it just alerts when this occurs.
False Positives
This rule can be falsely triggered if multiple users are using the same IP address, such as behind a firewall and multiple users trigger more than 30 login connections in 20 seconds. This can happen either with a large number of users, or an email client that can generate multiple connections at the same time (as with the IMAPX protocol).
If you believe that this is a false positive, then disable this rule or whitelist the source IP.
Tuning Recommendations
None.
Similar Rules