Number of attacks each hour from ip addresses based in China, USA and Iran displayed as a line graph.

Lies, Damn Lies & Graphics.

Almost every graphic up until this post and probably some subsequent ones, are open to misinterpretation and yet can also provide useful information and event overview.

The graphic below shows failed log in attempts each hour over the 320 day logging period from the previous dovecot logging articles. The line graph was produced using the defaults within the python seaborn: statistical data visualization package.

It is an example of poor practice in data visualisation. It appears that China based ip addresses attacked around 20:00 (8 pm). Below is a corrected graphic where the hour hits for the UK have been added.

Line graph of hourly breakdown for the 320 day logging period.

Compared with the British attack and rescaled, the spread of China over the hours each day, look a lot less dramatic. The largest “Chinese”1 peak at 20:00 was a 20% variance, however on the first graphic it appears more dramatic when the x-axis does not start from zero.

For the UK, on the 25th May 2023 between 08:12 and 08:51, 2 computers attempted 206 logins, the average hourly login was 28 failed attempts, in total over the 320 day period 226 failed attempts at 8 am were made, giving a 700% increase and the spike illustrated above.

And this leads to the “possibly open to misinterpretation” comments above. To produce the graphics the data is grouped, this is to highlight changes in state. So in these “hourly” graphics it would be a mistake to assume that a point on the line between 8 and 9 was the amount of attacks that happened at half past eight in the morning. This would be massively incorrect. The point at 8am is for all the hits that occurred from 8 to 9, it would be less liable to be misinterpreted if the graph was a histogram.

So a quick comparison:

Iran appears enthusiastic at 2 am and 11 am compared to China and the USA

However as a bar plot the data is almost unintelligible.

Likewise with the all the data analysis from the embedded tableau line graphs.

It could be assumed that around the 25th May there was a massive increase that dropped down in a linear fashion a week later. This is entirely incorrect, there were in fact no attempts at all until 31st May so the line is going from point to point rather than dropping to 0 for the days when no logins were attempted.

It should be noted that the graphics are not provided for drama or misinterpretation, they are provided to quickly view that an abnormal event has taken place.

Viewing a spreadsheet the data may not be obvious, in the above example, if the data was in date order then one might pick up a jump from 6 or 7 hits to 200 but only if the table was showing the UK, as it happened an Iranian botnet was present at the same time so overall high loads were present. If the data was sorted by number of hits over the year per day as below. 200 hits from two UK addresses would easily be overlooked as ordered by hits per day it is the 21st day on the list and yet the event so easily visualised formed the basis of an investigation into a potentially serious configuration error.

iddayhits
12023-11-121307
22023-11-131070
32023-11-11468
42023-05-09396
52023-04-14390
62023-04-21358
72023-04-22356
82023-04-25342
92023-07-19329
102023-03-02320
112023-02-09313
122023-03-16307
132023-03-23306
142023-03-08304
152023-11-21292
162023-07-17290
172023-04-13289
182023-11-23279
192023-03-19276
202023-03-09275
212023-05-25273
  1. “Chinese” only as attacks from computers that appear to have ip addresses based in China. ↩︎

Posted

in

by

Tags: