Skip to content

alexojocyber/Splunk-SIEM-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 

Repository files navigation

πŸ” Splunk SIEM Lab β€” Brute Force Detection & Response Dashboard

πŸ“Œ Project Overview

This project demonstrates how to use Splunk Cloud as a SIEM to ingest Linux authentication logs, detect brute-force attack patterns, and visualize findings on a real-time SOC dashboard.

The objective was to simulate a real-world SOC analyst workflow β€” from raw log ingestion to detection, investigation, and dashboard reporting.


πŸ› οΈ Lab Environment

Component Details
SIEM Platform Splunk Cloud (Free Trial)
Operating System Ubuntu Linux
Log Source /var/log/auth.log
Attack Type SSH Brute Force
Target User attackeruser
Source IP 192.168.0.168

βš™οΈ Lab Setup

Auth logs were exported from Ubuntu Linux using:

sudo cat /var/log/auth.log > ~/brute-force-logs.txt

The log file was then uploaded to Splunk Cloud via Settings β†’ Add Data β†’ Upload with source type set to syslog.


πŸ”Ž Detection Queries (SPL)

Detection 1 β€” Failed Login Events

index=main sourcetype=syslog "Failed password"

Detection 2 β€” Failed Logins by Host

index=main sourcetype=syslog "Failed password" | stats count by host

Detection 3 β€” Attack Timeline

index=main sourcetype=syslog "Failed password" | timechart count

Detection 4 β€” Full Event Table

index=main sourcetype=syslog "Failed password" | table _time, host, source

πŸ“Š Investigation Findings

Field Details
Total Failed Attempts 7
Targeted Host user-HP-EliteBook-x360-1030-G2
Attack Dates March 29-30, 2026
Peak Attack Time 12:44 β€” 12:46 PM (5 attempts in 2 minutes)
Log Source brute-force-logs.txt

πŸ–₯️ Dashboard

A Brute Force Detection & Response Dashboard was built in Splunk with 4 panels:

  • Failed Login Attempts by Host β€” Bar chart
  • Total Failed Login Attempts β€” Single value counter (7)
  • Attack Timeline β€” Column chart showing attack burst
  • Failed Login Events β€” Full event table with timestamps

πŸ“Έ Screenshots

Detection Query β€” Failed Password Events

Detection1

Failed Logins by Host β€” Bar Chart

Detection2

Attack Timeline

Detection3

Brute Force Detection & Response Dashboard

Detection-report

🎯 MITRE ATT&CK Mapping

Tactic Technique Description
Credential Access T1110 β€” Brute Force Repeated failed SSH login attempts
Credential Access T1110.001 β€” Password Guessing Multiple password attempts against single account
Discovery T1078 Valid account targeted during attack

πŸ”’ NIST & CIS Controls Mapping

Finding NIST Control CIS Control
Brute Force Detected AC-7 β€” Unsuccessful Login Attempts CIS 4.10
Auth Log Monitored AU-2 β€” Event Logging CIS 8.2
Attack Timeline Captured SI-4 β€” System Monitoring CIS 8.11

⚠️ Risk Impact

The detected brute-force activity represents a significant authentication threat. If successful, an attacker could gain unauthorized access leading to data compromise, privilege escalation, or lateral movement across the network.


πŸ›‘οΈ Recommended Actions

  • Implement Fail2Ban to auto-block repeated failed attempts
  • Enforce strong password policies and MFA
  • Restrict SSH access to trusted IP addresses only
  • Set up real-time Splunk alerts for failed login thresholds
  • Monitor authentication logs continuously

🎯 Skills Demonstrated

  • Splunk Cloud SIEM configuration
  • Log ingestion and parsing
  • SPL (Search Processing Language) queries
  • Dashboard creation and visualization
  • Threat detection and investigation
  • MITRE ATT&CK mapping
  • NIST & CIS compliance mapping
  • Incident documentation

πŸ”— Related Projects


πŸ‘¨β€πŸ’» Author

Alex Ojo Cybersecurity Student | SOC Analyst Trainee

LinkedIn GitHub

About

SOC detection lab using Splunk Cloud to ingest Linux auth logs, build brute force detection queries, and visualize attack timelines on a real-time dashboard.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors