Giter Site home page Giter Site logo

suricata-rules's Introduction

English | 简体中文

suricata-rules

Suricata is an excellent open source intrusion detection system that records the high quality Suricata IDS rules 
extracted by security operations staff. Welcome to submit 

Rules are written as follows

Each rule corresponds to the new directory as follows

webshell detect	#Rule directory name - clearly described according to the corresponding detection rules
- webshell.pcap	#The pcap package corresponding to the rule is saved as much as possible in the form of flow.
- websehll.rules	#The rule file extracted by yourself, try to test the submission.
- README	#Can describe some rules related things, easy for others to understand, support Markdown

Rule directory

The directory is named after a single CVE, hacking tool, threat type. If there is a corresponding rule directory, 
it is recommended to store it in the existing rule directory.

The rule corresponds to the pcap package

After the pcap corresponding to the rule is filtered by Wireshark, use the menu file 
-- save a specific group -- to select the pcap format to upload.

Easy to identify malicious streaming data, also minimal, easy to move and backup

rule.rules

The rules file is named randomly, but the suffix must be rules, such as: webshell_caidao.rules

Multiple rule files can appear in the file, as stated in the README note The rules are recommended as follows:

Example

sid:
0~1000000   Sourcefire VRT
2000001~2999999     EMerging Threats(ET)
3000000~3999999     public
Network scanning    3000000~3000999
Violent cracking    3001000~3001999
Exploit    3002000~3002999
Back door    3003000~3003999
WebShell    3004000~3004999
Virus Trojan    3005000~3005999
Spyware    3006000~3006999
safety certificate    3007000~3007999
Code execution    3008000~3008999
File restore    3009000~3009999
file transfer    3010000~3010999
Suspicious DNS    3011000~3011999
HTTP    3012000~3012999
Malicious behavior    3013000~3013999
Violation operation    3014000~3014999
Sensitive information leakage    3015000~3015999
Hacking tool    3016000~3016999
Ctypto miner    3017000~3017999
Rev is incremented for each version of the rule version, metadata added creation date and creator
Reference is a reference source/reference material, such as a CVE number, or a fix, an attack description,
and so on.
alert http any any -> any any (msg:"webshell_caidao_php"; flow:established; content:"POST";
http_method; content:".php"; http_uri; content:"base64_decode"; http_client_body;  sid:3004001; 
rev:1; metadata:created_at 2018_11_14, by al0ne;)

Note

Description of the root directory file of this project

suricata-ids.rules	#A collection of all rules, directly downloading rule file replacements when updating.
disable.conf	#Suricata disable rules are recorded during analysis (invalid, false positives, etc.)
sid.txt 	#The sid of all rules is recorded to avoid duplication, and the sid.txt file must be updated 
each time the rule is added.

Acknowledgments

suricata-rules's People

Contributors

al0ne avatar charm1y avatar lrvy avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.