ids:emerging_threats:emerging_threat_categories
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
ids:emerging_threats:emerging_threat_categories [2021/07/20 12:42] – peter | ids:emerging_threats:emerging_threat_categories [2021/07/20 13:45] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== IDS - Emerging Threats - Emerging Threat Categories ====== | ||
- | Protects against attacks and exploits of: | ||
- | |||
- | ^Category^Description^Reference^ | ||
- | |3CORESec|Generated automatically from the 3CORESec team IP block lists; based on malicious activity from their Honeypots.|https:// | ||
- | |ActiveX|Microsoft ActiveX controls.| | | ||
- | |Adware-PUP|Ad-tracking and spyware related activity.| | | ||
- | |Attack Response|Identifies responses indicative of intrusion; such as LMHost file download, presence of certain web banners and the detection of Metasploit Meterpreter kill command.|| | ||
- | |Botcc (Bot Command and Control)|Auto-generated from several sources of known and confirmed active botnet and other Command and Control (C2) hosts.|https:// | ||
- | |Botcc Portgrouped|Similar to the Botcc category but grouped by destination port. Rules grouped by port can offer higher fidelity than those not grouped by port.|| | ||
- | |Chat|Chat clients such as Internet Relay Chat (IRC).| | | ||
- | |CIArmy|Generated using Collective Intelligence IP blocking rules.|https:// | ||
- | |Coinmining|Malware which performs coin mining.| | | ||
- | |Compromised|Known compromised hosts; updated daily from several private but highly reliable data sources.| | | ||
- | |::: | ||
- | |Current Events|In response to active and short-lived campaigns and high-profile items that are expected to be temporary; such as fraud campaigns related to disasters.| | | ||
- | |:::|The rules in this category are not intended to be kept in in the ruleset for long.| | | ||
- | |Deleted|Signatures removed from a rule set; often due to being problematic or duplicates or being super-seeded.|| | ||
- | |DNS|Attacks and vulnerabilities regarding Domain Name Service (DNS) including tunneling.|| | ||
- | |DOS|Denial of Service (DoS) attempts.|| | ||
- | |Drop|To block IP addresses on the Spamhaus DROP (Do not Route or Peer) list, which is updated daily.|https:// | ||
- | |Dshield|Attackers identified by Dshield, updated daily from the DShield top attackers list which is very reliable.|https:// | ||
- | |Exploit|Direct exploits not otherwise covered in a specific service category; including vulnerabilities against Microsoft Windows.| | | ||
- | |::: | ||
- | |Exploit-Kit|Activity related to Exploit Kits.| | | ||
- | |FTP|Attacks, | ||
- | |Games|Gaming traffic and attacks against those games.| | | ||
- | |::: | ||
- | |Hunting|Threat hunting in an environment.| | | ||
- | |:::|These rules can provide false positives on legitimate traffic and inhibit performance. They are only recommended for use when actively researching potential threats in the environment.| | | ||
- | |||
- | ---- | ||
- | |||
- | ===== References ===== | ||
- | |||
- | https:// |
ids/emerging_threats/emerging_threat_categories.1626784955.txt.gz · Last modified: 2021/07/20 12:42 by peter