User Tools

Site Tools


ids:rule_categories:snort_rule_set_categories

This is an old revision of the document!


IDS - Rule Categories - Snort Rule Set Categories

NOTE: Some signatures are not inherently malicious but may be of interest to organizations or for logging purposes.

Protects against attacks and exploits of:

CategoryDescription
app-detectApplications that generate network activity.
blacklistURI, USER-AGENT, DNS, and IP address rules that have been determined to be indicators of malicious activity.
browser-chromeChrome browser vulnerabilities.
This is separate from the browser-webkit category, as Chrome has enough vulnerabilities itself.
browser-firefoxFirefox browser vulnerabilities.
Includes products that have the Gecko engine. (Thunderbird email client, etc).
browser-ieInternet Explorer vulnerabilities.
browser-webkitWebkit browser engine vulnerabilities.
Includes Apple Safari, RIM mobile browser, Nokia, KDE, Webkit itself, and Palm. Does not include Chrome.
browser-otherOther browser vulnerabilities not listed above.
browser-pluginsBrowser plugin vulnerabilities, such as Active-x.
content-replaceAny rule that utilizes the replace functionality inside of Snort.
deletedDeprecated or superseeded rules.
exploitAn older category which will be deprecated soon. This category looks for exploits against software in a generic form.
exploit-kitExploit kit activity.
This does not include post-compromise rules (as those would be in indicator-compromise).
file-executableExecutable file vulnerabilities.
file-flashFlash file vulnerabilities. Either compressed or uncompressed.
file-imageImages file vulnerabilities. (jpg, png, gif, bmp, etc).
file-identifyIdentify files through file extension, the content in the file (file magic), or header found in the traffic.
This information is usually used to then set a flowbit to be used in a different rule.
file-javaJava file vulnerabilities. (.jar)
file-multimediaMultimedia file vulnerabilities. (mp3, movies, wmv)
file-officeMicrosoft Office suite of software vulnerabilities. (Excel, PowerPoint, Word, Visio, Access, Outlook, etc)
file-pdfPDF file vulnerabilities.
file-otherFile vulnerabilities, that do not fit into the other categories.
indicator-compromiseThe detection of a positively compromised system; false positives may occur.
indicator-obfuscationThe detection of obfuscated content. Like encoded JavaScript rules.
indicator-shellcodeDetection of Shellcode. This replaces the old “shellcode.rules”.
indicator-scanDetection of network scanning. This replaces the old “scan.rules”.
malware-backdoorDetection of traffic destined to known listening backdoor command channels.
malware-cncIdentified botnet traffic.
malware-toolsMalicious in nature.
malware-otherMalware related, but do not fit into one of the other malware categories.
os-linuxVulnerabilities in Linux based OSes. Not for browsers or any other software on it, but simply against the OS itself.
os-solarisVulnerabilities in Solaris based OSes. Not for any browsers or any other software on top of the OS.
os-windowsVulnerabilities in Windows based OSes. Not for any browsers or any other software on top of the OS.
os-mobileVulnerabilites in Mobile based OSes. Not for any browsers or any other software on the top of the OS.
os-otherVulnerabilities in an OS that is not listed above.
policy-multimediaPotential violations of policy for multimedia, such as the use of iTunes on the network.
This is not for vulnerabilities found within multimedia files, as that would be in file-multimedia.
policy-socialPotential violations of policy on corporate networks for the use of social media. (p2p, chat, etc).
policy-spamPotential spam on the network.
policy-otherMay violate the end-users corporate policy but do not fall into any of the other policy categories first.
protocol-dnsThe presence of DNS protocol or vulnerabilities on the network.
protocol-fingerThe presence of the finger protocol or vulnerabilities on the network.
protocol-ftpThe presence of the FTP protocol or vulnerabilities on the network.
protocol-icmpThe presence of ICMP traffic or vulnerabilities on the network.
protocol-imapThe presence of the IMAP protocol or vulnerabilities on the network.
protocol-nntpThe presence of the NNTP protocol or vulnerabilities on the network.
protocol-popThe presence of the POP protocol or vulnerabilities on the network.
protocol-rpcThe presence of the RPC protocol or vulnerabilities on the network.
protocol-scadaThe presence of SCADA protocols or vulnerabilities on the network.
protocol-servicesThe presence of the rservices protocol or vulnerabilities on the network.
protocol-snmpThe presence of the SNMP protocol or vulnerabilities on the network.
protocol-telnetThe presence of the telnet protocol or vulnerabilities on the network.
protocol-tftpThe presence of the TFTP protocol or vulnerabilities on the network.
protocol-voipThe presence of VOIP services or vulnerabilities on the network.
protocol-otherPotential vulnerabilties in protocols, that do not fit into one of the other “protocol” rule files.
pua-adwarePotentially Unwanted Applications (pau) that deal with adware or spyware.
pua-p2pPotentially Unwanted Applications (pau) that deal with p2p.
pua-toolbarsPotentially Unwanted Applications (pau) that deal with toolbars installed on the client system. (Google Toolbar, Yahoo Toolbar, Hotbar, etc)
pua-otherPotentially Unwanted Applications (pau) that do not fit into one of the categories shown above.
server-apacheApache Web Server.
server-iisMicrosoft IIS Web server.
server-mssqlMicrosoft SQL Server.
server-mysqlOracle MySQL server.
server-oracleOracle DB Server.
server-sambaSamba Servers.
server-webappWeb based applications on servers.
server-mailMail servers. (Exchange, Courier).
These are separate from the protocol categories, as those deal with the traffic going to the mail servers itself.
server-otherVulnerabilities or attacks against servers that are not detailed in the above list.
sqlSQL injection or other vulnerabilities against SQL like servers.
x11X11 usage or other vulnerabilities against X11 like servers.

References

ids/rule_categories/snort_rule_set_categories.1626791388.txt.gz · Last modified: 2021/07/20 14:29 by peter

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki