This project demonstrates SSH authentication log analysis using Splunk SIEM to detect malicious activity such as brute-force attacks, unauthorized access attempts, and suspicious SSH behavior.
It simulates real-world SOC analyst workflows, including log ingestion, SPL queries, dashboards, and alerting.
The project aims to detect and analyze:
- β Successful SSH logins (source and destination analysis)
- β Failed login attempts (password guessing & spraying)
- π¨ Multiple failed authentication attempts (brute-force indicators)
- π Connections without authentication (SSH probing or scanning)
- Splunk Enterprise / Splunk Free
- Basic understanding of SPL
ssh_log.json(JSON-formatted SSH authentication logs)
-
Log in to Splunk Web
-
Navigate to:
Apps β Search & Reporting
-
Click:
Add Data β Upload
-
Configure:
- Source type:
_json - Index:
ssh_logs
- Source type:
- Click Start Searching
event_typeauth_successauth_attemptsid.orig_h(Source IP)id.resp_h(Destination Host)
index=ssh_logs
| stats count by event_type
β Confirms successful ingestion and parsing.

index=ssh_logs event_type="Failed SSH Login"
| stats count by id.orig_h
| sort - count
| head 10
- π Bar Chart
- Failed login attempts per source IP
π Purpose: Identify suspicious IPs attempting credential abuse.

index=ssh_logs event_type="Multiple Failed Authentication Attempts"
| stats count by id.orig_h, id.resp_h
| where count > 5
- Trigger: > 5 failed attempts
- Time Window: 10 minutes
- Alert Type: Scheduled / Real-Time
- Action: SOC notification or email
π Purpose: Early detection of brute-force attacks.

index=ssh_logs event_type="Successful SSH Login"
| stats count by id.orig_h, id.resp_h
- Compare IPs with prior failed attempts
- Detect possible compromised credentials
π Dashboard Panel:
- Top source IPs with successful SSH access
index=ssh_logs event_type="Connection Without Authentication"
| stats count by id.orig_h
index=ssh_logs event_type="Connection Without Authentication"
| timechart count by id.orig_h
π Purpose: Detect reconnaissance, SSH probing, or port scanning.
- π SSH Successful Login Monitoring
- β Failed Authentication Attempts
- π¨ Brute-Force Detection
- π Unauthenticated SSH Connection Trends
| Alert Name | Condition | Time Window |
|---|---|---|
| Brute Force Detection | >5 failed attempts | 10 minutes |
- Splunk SIEM
- SPL Query Writing
- Log Parsing & Analysis
- Brute-force Detection
- Security Monitoring
- SOC Operations
β Real-world SOC use cases implemented β Actionable dashboards & alerts created β Improved threat detection capability β Portfolio-ready cybersecurity project
This project is ideal for showcasing:
- SOC Analyst readiness
- SIEM hands-on experience
- Log-based threat detection skills
I can help you add:
- πΈ Dashboard screenshots
- π§Ύ Resume bullet points
- π‘οΈ Incident response mapping (MITRE ATT&CK)
- π§© Splunk alert screenshots
- π GitHub profile optimization
Just tell me π


