heroui logo

Cisco Secure Firewall - Repeated Blocked Connections

Splunk Security Content

View Source
Summary
This detection rule for Cisco Secure Firewall focuses on identifying repeated blocked connection attempts where the same initiator (source IP) attempts to connect to the same responder (destination IP) within a short time frame. Specifically, it captures cases where the firewall logs indicate that the action was 'Block' and the number of blocked attempts reaches a threshold of ten or more within one minute. Such patterns typically signal potential issues such as misconfiguration of applications, unauthorized access attempts, or may indicate the early stages of brute-force attacks or scanning operations. If an attack is confirmed, this behavior could point towards an attacker probing the network, targeting lateral movements, or testing the effectiveness of firewall rules. The insights from this rule can be pivotal for security teams in detecting unusual patterns of network behavior, addressing potential vulnerabilities, and mitigating threats before they escalate.
Categories
  • Network
  • Cloud
Data Sources
  • Cloud Service
  • Firewall
ATT&CK Techniques
  • T1018
  • T1046
  • T1110
  • T1203
  • T1595.002
Created: 2025-04-02