Find Resources and Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

Subscribe to this discussion

Intrusion Monitoring

Hello, I would like to understand what are the industry standards on monitoring "login failure thresholds". Does anyone know what standard the industry utilizes to categorize the issue as a possible intrusion threat / attack?
You must sign in to rate content.
(Unrated)

Comments

RE: Intrusion Monitoring

Typically, it is 3 failed attempts at login. But then again, it depends on your business criticality.
Shruti KulkarniEnergizer at 7/23/2014 11:47:36 PM Quote
You must sign in to rate content.
(1 ratings)

RE: Intrusion Monitoring

Agreed to you shruti, i would like to elaborate it further particularly in IDS perspective please correct me if i am wrong, as far as "login failure thresholds" related to intrusion monitoring/ intrusion detection system is concern, IDS are basically Host based (look at logs and protect the host) or network based, three types of Host based IDS are; Signature based (won't catch new attacks),  statistical based (perform behaviour analysis) and Neural networks (Creates a DB like statistical but self learning, these can take large amount of input and can be used to detect fraud) Moreover, IDS comprises on sensors, analyzers, admin console and user interface.
Muzaffer ZaidiSocial at 12/31/2014 3:14:17 AM Quote
You must sign in to rate content.
(Unrated)

RE: Intrusion Monitoring

Agreed to you shruti, i would like to elaborate it further particularly in IDS perspective please correct me if i am wrong, as far as "login failure thresholds" related to intrusion monitoring/ intrusion detection system is concern, IDS are basically Host based (look at logs and protect the host) or network based, three types of Host based IDS are; Signature based (won't catch new attacks),  statistical based (perform behaviour analysis) and Neural networks (Creates a DB like statistical but self learning, these can take large amount of input and can be used to detect fraud) Moreover, IDS comprises on sensors, analyzers, admin console and user interface.
Muzaffer ZaidiSocial at 12/31/2014 3:14:17 AM Quote
You must sign in to rate content.
(Unrated)

RE: Intrusion Monitoring

Typically, it is 3 failed attempts at login. But then again, it depends on your business criticality.
Shruti KulkarniEnergizer at 7/23/2014 11:47:36 PM Quote
You must sign in to rate content.
(1 ratings)

RE: Intrusion Monitoring

Typically, it is 3 failed attempts at login. But then again, it depends on your business criticality.
Shruti KulkarniEnergizer at 7/23/2014 11:47:36 PM Quote
You must sign in to rate content.
(1 ratings)

RE: Intrusion Monitoring

Agreed to you shruti, i would like to elaborate it further particularly in IDS perspective please correct me if i am wrong, as far as "login failure thresholds" related to intrusion monitoring/ intrusion detection system is concern, IDS are basically Host based (look at logs and protect the host) or network based, three types of Host based IDS are; Signature based (won't catch new attacks),  statistical based (perform behaviour analysis) and Neural networks (Creates a DB like statistical but self learning, these can take large amount of input and can be used to detect fraud) Moreover, IDS comprises on sensors, analyzers, admin console and user interface.
Muzaffer ZaidiSocial at 12/31/2014 3:14:17 AM Quote
You must sign in to rate content.
(Unrated)

Leave a Comment

* required

You must login to leave a comment.