ids:rule_categories:snort_rule_set_categories

IDS - Rule Categories - Snort Rule Set Categories

NOTE: Some signatures are not inherently malicious but may be of interest to organizations or for logging purposes.

  • Policy: Are policy-based rules, so can be not used is not against company policy.
  • Depreciated: Abandoned and depreciated rules.

Protects against attacks and exploits of:

CategoryDescriptionPolicyDepreciated
app-detectApplications that generate network activity.
attack-responsesUsually occurs after a machine has been compromised. Y
backdoorBackdoor Trojan activity; the target machine may already be compromised. Y
bad-trafficTraffic that should never be seen on any network, such as TCP and UDP port 0 traffic, or a SYN packet to a multicast address. Y
blacklistURI, USER-AGENT, DNS, and IP address rules that have been determined (Reputation pre-processor) to be indicators of malicious activity.
botnet-cncBotnets. Y
browser-chromeChrome browser vulnerabilities.
This is separate from the browser-webkit category, as Chrome has enough vulnerabilities itself.
browser-firefoxFirefox browser vulnerabilities.
Includes products that have the Gecko engine. (Thunderbird email client, etc).
browser-ieInternet Explorer vulnerabilities.
browser-webkitWebkit browser engine vulnerabilities.
Includes Apple Safari, RIM mobile browser, Nokia, KDE, Webkit itself, and Palm. Does not include Chrome.
browser-otherOther browser vulnerabilities not listed above.
browser-pluginsBrowser plugin vulnerabilities, such as Active-x.
chatChat programs, such as AIM, ICQ, and IRC, which may be against corporate policy.YY
content-replaceAny rule that utilizes the replace functionality inside of Snort.
ddosDistributed denial of service (DDoS). Y
deletedDeprecated or super-seeded rules. Y
dnsDNS, including detection of zone transfers. Y
dosDenial of service (DoS), including IGMP and teardrop attacks. Y
experimentalExperimental rules, mostly where new types of rules are included. May be empty. Y
exploitKnown generic exploits. An older category which will be deprecated soon. Y
exploit-kitExploit kit activity.
This does not include post-compromise rules (as those would be in indicator-compromise).
file-executableExecutable file vulnerabilities.
file-flashFlash file vulnerabilities. Either compressed or uncompressed.
file-imageImages file vulnerabilities. (jpg, png, gif, bmp, etc).
file-identifyIdentify files through file extension, the content in the file (file magic), or header found in the traffic.
This information is usually used to then set a flowbit to be used in a different rule.
file-javaJava file vulnerabilities. (.jar)
file-multimediaMultimedia file vulnerabilities. (mp3, movies, wmv)
file-officeMicrosoft Office suite of software vulnerabilities. (Excel, PowerPoint, Word, Visio, Access, Outlook, etc)
file-pdfPDF file vulnerabilities.
file-otherFile vulnerabilities, that do not fit into the other categories.
fingerFinger service that runs by default on many Unix-based operating systems. Y
ftpFTP service. Y
icmpPings specific to particular attack tools. Y
icmp-infoFor troubleshooting a specific ICMP problem on the network, but in general it just generates noise and should remain disabled. Y
imapIMAP email service. Y
indicator-compromiseThe detection of a positively compromised system; false positives may occur.
indicator-obfuscationThe detection of obfuscated content. Like encoded JavaScript rules.
indicator-shellcodeDetection of Shellcode. This replaces the old “shellcode.rules”.
indicator-scanDetection of network scanning. This replaces the old “scan.rules”.
infoFor troubleshooting. Y
localLocal rules you create.
malware-backdoorDetection of traffic destined to known listening backdoor command channels.
malware-cncIdentified botnet traffic.
malware-otherMalware related, but do not fit into one of the other malware categories.
malware-toolsMalicious in nature.
miscMiscellanious rules that do not fit easily into another category. Y
multimediaStreaming media.YY
mysqlUnusual and potentially malicious MySQL traffic. Y
netbiosAdministrative share access alerts on SMB and NetBIOS access.
nntpNNTP (Network time protocol servers). Y
oracleOracle database servers. Y
os-linuxVulnerabilities in Linux based OSes. Not for browsers or any other software on it, but simply against the OS itself.
os-solarisVulnerabilities in Solaris based OSes. Not for any browsers or any other software on top of the OS.
os-windowsVulnerabilities in Windows based OSes. Not for any browsers or any other software on top of the OS.
os-mobileVulnerabilites in Mobile based OSes. Not for any browsers or any other software on the top of the OS.
os-otherVulnerabilities in an OS that is not listed above.
other-idsThe use of other IDSs. Y
p2pThe use of P2P (peer to peer software) protocols.YY
phishing-spamPhishing spam. Y
policyPolicy rules, including use of PC Anywhere and VNC traffic, or an anonymous FTP login.YY
policy-multimediaPotential violations of policy for multimedia, such as the use of iTunes on the network.Y
This is not for vulnerabilities found within multimedia files, as that would be in file-multimedia.
policy-otherMay violate the end-users corporate policy but do not fall into any of the other policy categories first.Y
policy-socialPotential violations of policy on corporate networks for the use of social media. (p2p, chat, etc).Y
policy-spamPotential spam on the network.Y
pop2POP2 email service. Y
pop3POP3 email service. Y
pornPorn.Y
protocol-dnsThe presence of DNS protocol or vulnerabilities on the network.
protocol-fingerThe presence of the finger protocol or vulnerabilities on the network.
protocol-ftpThe presence of the FTP protocol or vulnerabilities on the network.
protocol-icmpThe presence of ICMP traffic or vulnerabilities on the network.
protocol-imapThe presence of the IMAP protocol or vulnerabilities on the network.
protocol-nntpThe presence of the NNTP protocol or vulnerabilities on the network.
protocol-otherPotential vulnerabilties in protocols, that do not fit into one of the other “protocol” rule files.
protocol-popThe presence of the POP protocol or vulnerabilities on the network.
protocol-rpcThe presence of the RPC protocol or vulnerabilities on the network.
protocol-scadaThe presence of SCADA protocols or vulnerabilities on the network.
protocol-servicesThe presence of the rservices protocol or vulnerabilities on the network.
protocol-snmpThe presence of the SNMP protocol or vulnerabilities on the network.
protocol-telnetThe presence of the telnet protocol or vulnerabilities on the network.
protocol-tftpThe presence of the TFTP protocol or vulnerabilities on the network.
protocol-voipThe presence of VOIP services or vulnerabilities on the network.
pua-adwarePotentially Unwanted Applications (pau) that deal with adware or spyware.
pua-otherPotentially Unwanted Applications (pau) that do not fit into one of the “pau” categories.
pua-p2pPotentially Unwanted Applications (pau) that deal with p2p.
pua-toolbarsPotentially Unwanted Applications (pau) that deal with toolbars installed on the client system. (Google Toolbar, Yahoo Toolbar, Hotbar, etc)
rpcRPC (Remote Procedure Call). Y
rservicesThe use of rservices commands to control remote systems, including rlogin, rsh, and rexec. Y
scadaScada. Y
scanNetwork scanners, including port scanning, IP mapping, and various application scanners. Y
server-apacheApache Web Server.
server-iisMicrosoft IIS Web server.
server-mailMail servers. (Exchange, Courier).
These are separate from the protocol categories, as those deal with the traffic going to the mail servers itself.
server-mssqlMicrosoft SQL Server.
server-mysqlOracle MySQL server.
server-oracleOracle DB Server.
server-otherVulnerabilities or attacks against servers that are not detailed in other “server” categories.
server-sambaSamba Servers.
server-webappWeb based applications on servers.
shellcodeDetects shellcode in the packet payload. Y
WARNING: Since these rules are designed the check the payloads of all traffic, they can cause a significant performance hit when enabled.
smtpSMTP email service. Y
snmpSNMP traffic. SNMP is used to manage devices on a network. Y
specific-threatsSpecific-threats. Y
spyware-putSpyware. Y
sqlSQL injection or other vulnerabilities against SQL like servers.
telnetTelnet exploits and unpassword protected accounts. Y
tftpTFTP. Y
virusVirus. Y
voipVOIP. Y
web-activexActiveX. Y
web-attacksWeb servers and Web form variable vulnerabilities. Y
web-cgiCGI (Common Gateway Interface) which web servers use to execute external programs. Y
web-clientBad things coming from users, and attacks against web users. Y
web-coldfusionColdfusion web application services. Y
web-frontpageFrontpage web authoring services. Y
web-iisMicrosoft Internet Information Server (IIS) web servers. Y
web-miscGeneric web attacks. Y
web-phpAttacks against web servers running PHP applications. Y
x11X11 usage or other vulnerabilities against X11 like servers. Y

References

ids/rule_categories/snort_rule_set_categories.txt · Last modified: 2021/07/24 12:22 by peter

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki