Understanding Top Attackers Report

Reply
L1 Bithead

Understanding Top Attackers Report

Hello,

 

The Top Attackers reports lists:

  • Source Address
  • Source Host Name
  • Source User
  • Count

In a report I ran, all of our source addresses are internal addresses.  Why is that?  Is the report more of a top talkers report than an attackers report?  In other words, is the report more of a list high activity accounts or addresses? 

 

Is the Count the number of sessions the source address has had?

 

Thanks!!

 

Jeff

L7 Applicator

Re: Understanding Top Attackers Report

Hello,

Would you be able to post a snippet of the report so we can better assist?

 

Regards,

L1 Bithead

Re: Understanding Top Attackers Report

Thanks for the reply, Otakar.

 

I ran a Top Attackers report through the Email Scheduler, but I ran another one using Reports and exported it to a CSV file so I could change the source address, source host name, and source user.  But what's in the screen shot is the only information in the report.  It does not list a destination.  Thanks for the help.

 

Top Attackers.JPG

L1 Bithead

Re: Understanding Top Attackers Report

So is the Top Attackers report more of a top talkers report?  The Top Attackers report only lists source and count information.  So it seems to report about how active a source is, instead of specifically how many attacks it has done.  Again, all of the source IPs were internal in our report.  Has anyone else experienced the same thing?

 

Jeff

L7 Applicator

Re: Understanding Top Attackers Report

Hello,

Sorry for the delay in my response. You are correct. Its a list of counters based on the evetns that are triggered on the PAN. As an example, our internal scanners and monitoring solution are always at the top due to the nature of how they operate.

 

Hope that helps.

L7 Applicator

Re: Understanding Top Attackers Report

Check ACC > Threat Activity

 

Most likely top threats are "Suspicious TLS Evasion Found" and "Suspicious HTTP Evasion Found"

If your firewall is not set up as DNS proxy then it does not know if HTTP/SSL requests done by internal devices are going to valid IPs or someone is trying to spoof traffic to get through firewall URL filtering.

So those attempts count against your internal users as attackers.

Enterprise Architect @ Cloud Carib www.cloudcarib.com
ACE (3.0, 5.0, 6.0, 7.0), PCNSE (6, 7), PCNSI
L1 Bithead

Re: Understanding Top Attackers Report

Thanks!  Appreciate the reply!  So the title of the predefined report is misleading.

L1 Bithead

Re: Understanding Top Attackers Report

Okay.  Thanks for the explanation, Raido!

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!