- Account Lockouts
- Concurrent Session Utilization
- Blocked Content
- Impossible Travel
- Resource Consumption
- Resource Inaccessibility
- Out-of-Cycle Logging
- Missing Logs
- Published or Documented Attacks
These indicators help in detecting and responding to potential malicious activity on a network or a system.
Repeated failed login attempts resulting in accounts being locked.
- Multiple login failures in a short period.
- Users reporting unexpected account lockouts.
- Account lockout events in security logs.
Multiple sessions active from different locations for a single user account.
- User account logged in from different geographic locations simultaneously.
- Unusual login times.
- Elevated number of active sessions.
Legitimate content being blocked by security mechanisms.
- Access to safe websites or services is denied.
- Frequent false positives by security filters.
- Users reporting inability to access necessary resources.
Logins from geographically distant locations within an impossible timeframe.
- Login from one country followed by a login from another country within minutes.
- Alerts for impossible travel scenarios.
- Discrepancies in login locations.
Excessive use of system resources like CPU, memory, or network bandwidth.
- Systems running unusually slow.
- Spikes in CPU or memory usage.
- Increased network traffic.
Legitimate users unable to access system resources or services.
- Users reporting inability to access files or applications.
- Services becoming unavailable.
- Frequent timeouts or access errors.
Unexpected logging activity outside of normal operational hours.
- Log entries during off-hours or holidays.
- Unusual patterns in log activity.
- System generating logs when idle.
Absence of expected log entries indicating potential tampering.
- Gaps in log records.
- Critical events not logged.
- Log tampering alerts.
Known attack methods or vulnerabilities being actively exploited.
- Reports of attacks using known vulnerabilities.
- Alerts from threat intelligence feeds.
- Documentation of attack patterns similar to observed activities.