This project demonstrates how to use Splunk Cloud as a SIEM to ingest Linux authentication logs, detect brute-force attack patterns, and visualize findings on a real-time SOC dashboard.
The objective was to simulate a real-world SOC analyst workflow β from raw log ingestion to detection, investigation, and dashboard reporting.
| Component | Details |
|---|---|
| SIEM Platform | Splunk Cloud (Free Trial) |
| Operating System | Ubuntu Linux |
| Log Source | /var/log/auth.log |
| Attack Type | SSH Brute Force |
| Target User | attackeruser |
| Source IP | 192.168.0.168 |
Auth logs were exported from Ubuntu Linux using:
sudo cat /var/log/auth.log > ~/brute-force-logs.txtThe log file was then uploaded to Splunk Cloud via Settings β Add Data β Upload with source type set to syslog.
index=main sourcetype=syslog "Failed password"
index=main sourcetype=syslog "Failed password" | stats count by host
index=main sourcetype=syslog "Failed password" | timechart count
index=main sourcetype=syslog "Failed password" | table _time, host, source
| Field | Details |
|---|---|
| Total Failed Attempts | 7 |
| Targeted Host | user-HP-EliteBook-x360-1030-G2 |
| Attack Dates | March 29-30, 2026 |
| Peak Attack Time | 12:44 β 12:46 PM (5 attempts in 2 minutes) |
| Log Source | brute-force-logs.txt |
A Brute Force Detection & Response Dashboard was built in Splunk with 4 panels:
- Failed Login Attempts by Host β Bar chart
- Total Failed Login Attempts β Single value counter (7)
- Attack Timeline β Column chart showing attack burst
- Failed Login Events β Full event table with timestamps
| Tactic | Technique | Description |
|---|---|---|
| Credential Access | T1110 β Brute Force | Repeated failed SSH login attempts |
| Credential Access | T1110.001 β Password Guessing | Multiple password attempts against single account |
| Discovery | T1078 | Valid account targeted during attack |
| Finding | NIST Control | CIS Control |
|---|---|---|
| Brute Force Detected | AC-7 β Unsuccessful Login Attempts | CIS 4.10 |
| Auth Log Monitored | AU-2 β Event Logging | CIS 8.2 |
| Attack Timeline Captured | SI-4 β System Monitoring | CIS 8.11 |
The detected brute-force activity represents a significant authentication threat. If successful, an attacker could gain unauthorized access leading to data compromise, privilege escalation, or lateral movement across the network.
- Implement Fail2Ban to auto-block repeated failed attempts
- Enforce strong password policies and MFA
- Restrict SSH access to trusted IP addresses only
- Set up real-time Splunk alerts for failed login thresholds
- Monitor authentication logs continuously
- Splunk Cloud SIEM configuration
- Log ingestion and parsing
- SPL (Search Processing Language) queries
- Dashboard creation and visualization
- Threat detection and investigation
- MITRE ATT&CK mapping
- NIST & CIS compliance mapping
- Incident documentation
Alex Ojo Cybersecurity Student | SOC Analyst Trainee