Files
blue-team-tools/rules/network/net_susp_network_scan.yml
T

23 lines
556 B
YAML
Raw Normal View History

2017-02-08 12:41:32 +01:00
title: Network Scans
2019-11-12 23:12:27 +01:00
id: fab0ddf0-b8a9-4d70-91ce-a20547209afb
2017-02-08 12:41:32 +01:00
description: Detects many failed connection attempts to different ports or hosts
2017-02-19 09:19:06 +01:00
author: Thomas Patzke
2017-02-19 00:31:59 +01:00
logsource:
2017-09-11 00:35:52 +02:00
category: firewall
2017-02-08 12:41:32 +01:00
detection:
selection:
2017-02-15 23:53:08 +01:00
action: denied
timeframe: 24h
2017-02-08 12:41:32 +01:00
condition:
2017-08-02 23:32:00 +02:00
- selection | count(dst_port) by src_ip > 10
- selection | count(dst_ip) by src_ip > 10
2017-09-12 23:54:04 +02:00
fields:
- src_ip
- dst_ip
- dst_port
2017-02-24 23:44:42 +01:00
falsepositives:
- Inventarization systems
- Vulnerability scans
- Penetration testing activity
level: medium