6
Quote:
What kind of abuse are you really trying to prevent? As a user, I may not always log in from the same location, or if I have a dial-up account, I may not always be assigned the same IP.
My goal is to monitor logs for password-sharing actions. For example, if I see Jane Dough logged in and I look over the records and see that there's 20 people trying to login at the same time with Jane's information, especially while Jane is already logged in. That is a pretty significant sign that either her account was comprimised or login information being shared.
In regards to dial-up, yes, I do understand about dynamic IP addresses. I know the IP address won't always be the same. If I see multiple IP addresses, then I see the owner of the IP block. If I see it belongs to the user's local ISP, then it's probably a dialup. In addition, most ISPs, as I have noticed, now have the term "dial", "dialup", or similar in the rDNS of the IP address for dialup users.
Granted, I am sure I have not mentioned some of the "tricks" to look for, however, it would take a bit of time to type up and list all the techniques for detecting suspicious activity.