Skip to content

This project demonstrates SSH authentication log analysis using Splunk SIEM to detect malicious activity such as brute-force attacks, unauthorized access attempts, and suspicious SSH behavior. It simulates real-world SOC analyst workflows, including log ingestion, SPL queries, dashboards, and alerting.

Notifications You must be signed in to change notification settings

GauravGhandat-23/SSH-Log-Analysis-using-Splunk

Repository files navigation

πŸ” SSH Log Analysis using Splunk

image

Splunk Cybersecurity SOC Status


πŸ“Œ Project Overview

This project demonstrates SSH authentication log analysis using Splunk SIEM to detect malicious activity such as brute-force attacks, unauthorized access attempts, and suspicious SSH behavior.

It simulates real-world SOC analyst workflows, including log ingestion, SPL queries, dashboards, and alerting.


🎯 Objectives

The project aims to detect and analyze:

  • βœ… Successful SSH logins (source and destination analysis)
  • ❌ Failed login attempts (password guessing & spraying)
  • 🚨 Multiple failed authentication attempts (brute-force indicators)
  • πŸ” Connections without authentication (SSH probing or scanning)

πŸ§ͺ Lab Setup & Prerequisites

Prerequisites

  • Splunk Enterprise / Splunk Free
  • Basic understanding of SPL

Dataset

  • ssh_log.json (JSON-formatted SSH authentication logs)

βš™οΈ Environment Setup

  1. Log in to Splunk Web

  2. Navigate to:

    Apps β†’ Search & Reporting
    
    1 2
  3. Click:

    Add Data β†’ Upload
    
    3 4 5
  4. Upload ssh_log.json 6 7

  5. Configure:

    • Source type: _json
    • Index: ssh_logs
8 9 10 11 12 13 14
  1. Click Start Searching
15

🧩 Step-by-Step Implementation


πŸ”Ή Task 1: Log Ingestion & Parsing

Extracted Fields

  • event_type
  • auth_success
  • auth_attempts
  • id.orig_h (Source IP)
  • id.resp_h (Destination Host)

Validation Query

index=ssh_logs
| stats count by event_type

βœ” Confirms successful ingestion and parsing. 16


πŸ”Ή Task 2: Failed Login Analysis

SPL Query

index=ssh_logs event_type="Failed SSH Login"
| stats count by id.orig_h
| sort - count
| head 10
17 18

Visualization

  • πŸ“Š Bar Chart
  • Failed login attempts per source IP

πŸ“Œ Purpose: Identify suspicious IPs attempting credential abuse. 19 20 21


πŸ”Ή Task 3: Brute-Force Detection

Multiple Failed Attempts Query

index=ssh_logs event_type="Multiple Failed Authentication Attempts"
| stats count by id.orig_h, id.resp_h
| where count > 5
22

🚨 Alert Configuration

  • Trigger: > 5 failed attempts
  • Time Window: 10 minutes
  • Alert Type: Scheduled / Real-Time
  • Action: SOC notification or email

πŸ“Œ Purpose: Early detection of brute-force attacks. 23 24 25 26 27 28 29


πŸ”Ή Task 4: Successful SSH Login Tracking

SPL Query

index=ssh_logs event_type="Successful SSH Login"
| stats count by id.orig_h, id.resp_h
30

Security Correlation

  • Compare IPs with prior failed attempts
  • Detect possible compromised credentials

πŸ“Š Dashboard Panel:

  • Top source IPs with successful SSH access
31 32 33 34 35

πŸ”Ή Task 5: Unauthenticated SSH Connections

Detection Query

index=ssh_logs event_type="Connection Without Authentication"
| stats count by id.orig_h
36

Time-Based Monitoring

index=ssh_logs event_type="Connection Without Authentication"
| timechart count by id.orig_h
37

πŸ“Œ Purpose: Detect reconnaissance, SSH probing, or port scanning.


πŸ“Š Dashboards Implemented

  • πŸ” SSH Successful Login Monitoring
  • ❌ Failed Authentication Attempts
  • 🚨 Brute-Force Detection
  • πŸ” Unauthenticated SSH Connection Trends

🚨 Alerts Implemented

Alert Name Condition Time Window
Brute Force Detection >5 failed attempts 10 minutes

🧠 Skills Demonstrated

  • Splunk SIEM
  • SPL Query Writing
  • Log Parsing & Analysis
  • Brute-force Detection
  • Security Monitoring
  • SOC Operations

βœ… Project Outcomes

βœ” Real-world SOC use cases implemented βœ” Actionable dashboards & alerts created βœ” Improved threat detection capability βœ” Portfolio-ready cybersecurity project


πŸš€ Portfolio Value

This project is ideal for showcasing:

  • SOC Analyst readiness
  • SIEM hands-on experience
  • Log-based threat detection skills

πŸ’‘ Want to enhance this further?

I can help you add:

  • πŸ“Έ Dashboard screenshots
  • 🧾 Resume bullet points
  • πŸ›‘οΈ Incident response mapping (MITRE ATT&CK)
  • 🧩 Splunk alert screenshots
  • πŸ† GitHub profile optimization

Just tell me πŸ‘

About

This project demonstrates SSH authentication log analysis using Splunk SIEM to detect malicious activity such as brute-force attacks, unauthorized access attempts, and suspicious SSH behavior. It simulates real-world SOC analyst workflows, including log ingestion, SPL queries, dashboards, and alerting.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published