Intrusion Event Details
As you construct a standard text rule, you can include contextual information that describes the vulnerability that the rule detects in exploit attempts. You can also include external references to vulnerability databases and define the priority that the event holds in your organization. When analysts see the event, they then have information about the priority, exploit, and known mitigation readily available.
Message
You can specify meaningful text that appears as a message when
the rule triggers. The message gives immediate insight into the nature of the
vulnerability that the rule detects attempts to exploit. You can use any
printable standard ASCII characters except curly braces ({}
). The system strips quotes that completely surround
the message.
Tip | You must specify a rule message. Also, the message cannot consist of white space only, one or more quotation marks only, one or more apostrophes only, or any combination of just white space, quotation marks, or apostrophes. |
To define the event message in the intrusion rules editor, you enter the event message in the Message field.
Classification
For each rule, you can specify an attack classification that appears in the packet display of the event. The following table lists the name and number for each classification.
Number |
Classification Name |
Description |
---|---|---|
1 |
not-suspicious |
Not Suspicious Traffic |
2 |
unknown |
Unknown Traffic |
3 |
bad-unknown |
Potentially Bad Traffic |
4 |
attempted-recon |
Attempted Information Leak |
5 |
successful-recon-limited |
Information Leak |
6 |
successful-recon-largescale |
Large Scale Information Leak |
7 |
attempted-dos |
Attempted Denial of Service |
8 |
successful-dos |
Denial of Service |
9 |
attempted-user |
Attempted User Privilege Gain |
10 |
unsuccessful-user |
Unsuccessful User Privilege Gain |
11 |
successful-user |
Successful User Privilege Gain |
12 |
attempted-admin |
Attempted Administrator Privilege Gain |
13 |
successful-admin |
Successful Administrator Privilege Gain |
14 |
rpc-portmap-decode |
Decode of an RPC Query |
15 |
shellcode-detect |
Executable Code was Detected |
16 |
string-detect |
A Suspicious String was Detected |
17 |
suspicious-filename-detect |
A Suspicious Filename was Detected |
18 |
suspicious-login |
An Attempted Login Using a Suspicious Username was Detected |
19 |
system-call-detect |
A System Call was Detected |
20 |
tcp-connection |
A TCP Connection was Detected |
21 |
trojan-activity |
A Network Trojan was Detected |
22 |
unusual-client-port-connection |
A Client was Using an Unusual Port |
23 |
network-scan |
Detection of a Network Scan |
24 |
denial-of-service |
Detection of a Denial of Service Attack |
25 |
non-standard-protocol |
Detection of a Non-Standard Protocol or Event |
26 |
protocol-command-decode |
Generic Protocol Command Decode |
27 |
web-application-activity |
Access to a Potentially Vulnerable Web Application |
28 |
web-application-attack |
Web Application Attack |
29 |
misc-activity |
Misc Activity |
30 |
misc-attack |
Misc Attack |
31 |
icmp-event |
Generic ICMP Event |
32 |
inappropriate-content |
Inappropriate Content was Detected |
33 |
policy-violation |
Potential Corporate Privacy Violation |
34 |
default-login-attempt |
Attempt to Login By a Default Username and Password |
35 |
sdf |
Sensitive Data |
36 |
malware-cnc |
Known malware command and control traffic |
37 |
client-side-exploit |
Known client side exploit attempt |
38 |
file-format |
Known malicious file or file based exploit |
Custom Classification
If you want more customized content for the packet display description of the events generated by a rule you define, you can create a custom classification.
Argument |
Description |
---|---|
Classification Name |
The name of the classification. The page is difficult to read if
you use more than 40 characters. The following characters are not supported:
|
Classification Description |
A description of the classification. You can use alphanumeric
characters and spaces. The following characters are not supported:
|
Priority |
High, medium, or low. |
Custom Priority
By default, the priority of a rule derives from the event
classification for the rule. However, you can override the classification
priority for a rule by adding the
priority
keyword to the rule and selecting a high,
medium, or low priority. For example, to assign a high priority for a rule that
detects web application attacks, add the
priority
keyword to the rule and select
high as the priority.
Custom Reference
You can use the
reference
keyword to add references to external web
sites and additional information about the event. Adding a reference provides
analysts with an immediately available resource to help them identify why the
packet triggered a rule. The following table lists some of the external systems
that can provide data on known exploits and attacks.
System ID |
Description |
Example ID |
---|---|---|
|
Bugtraq page |
|
|
Common Vulnerabilities and Exposure ID |
|
|
McAfee page |
|
|
Website reference |
|
|
Microsoft security bulletin |
|
|
Nessus page |
|
|
Secure Website Reference (https://...) |
Note that you can use
|
You specify a reference by entering a reference value, as follows:
id_system,id
where id_system is the system being used as a prefix, and id is the CVE ID number, Arachnids ID, or URL (without http://
).
For example, to specify the Adobe Acrobat and Reader issue documented in CVE-2020-9607, enter the value:
cve,2020-9607
Note the following when adding references to a rule:
-
Do not use a space after the comma.
-
Do not use uppercase letters in the system ID.