User Tools

Site Tools


ids:rule_categories:snort_rule_set_categories

This is an old revision of the document!


IDS - Rule Categories - Snort Rule Set Categories

NOTE: Some signatures are not inherently malicious but may be of interest to organizations or for logging purposes.

  • Policy: Are policy-based rules, so can be not used is not against company policy.
  • Depreciated: Abandoned and depreciated rules.

Protects against attacks and exploits of:

CategoryDescriptionPolicyDepreciated
app-detectApplications that generate network activity.
attack-responsesUsually occurs after a machine has been compromised. Y
backdoorBackdoor Trojan activity; the target machine may already be compromised. Y
bad-trafficTraffic that should never be seen on any network, such as TCP and UDP port 0 traffic, or a SYN packet to a multicast address. Y
blacklistURI, USER-AGENT, DNS, and IP address rules that have been determined (Reputation pre-processor) to be indicators of malicious activity.
botnet-cncBotnets.
browser-chromeChrome browser vulnerabilities.
This is separate from the browser-webkit category, as Chrome has enough vulnerabilities itself.
browser-firefoxFirefox browser vulnerabilities.
Includes products that have the Gecko engine. (Thunderbird email client, etc).
browser-ieInternet Explorer vulnerabilities.
browser-webkitWebkit browser engine vulnerabilities.
Includes Apple Safari, RIM mobile browser, Nokia, KDE, Webkit itself, and Palm. Does not include Chrome.
browser-otherOther browser vulnerabilities not listed above.
browser-pluginsBrowser plugin vulnerabilities, such as Active-x.
chatChat programs, such as AIM, ICQ, and IRC, which may be against corporate policy.Y
content-replaceAny rule that utilizes the replace functionality inside of Snort.
ddosDistributed denial of service (DDoS).
deletedDeprecated or super-seeded rules.
dnsDNS, including detection of zone transfers.
dosDenial of service (DoS), including IGMP and teardrop attacks.
experimentalExperimental rules, mostly where new types of rules are included. May be empty.
exploitKnown generic exploits. An older category which will be deprecated soon.
exploit-kitExploit kit activity.
This does not include post-compromise rules (as those would be in indicator-compromise).
file-executableExecutable file vulnerabilities.
file-flashFlash file vulnerabilities. Either compressed or uncompressed.
file-imageImages file vulnerabilities. (jpg, png, gif, bmp, etc).
file-identifyIdentify files through file extension, the content in the file (file magic), or header found in the traffic.
This information is usually used to then set a flowbit to be used in a different rule.
file-javaJava file vulnerabilities. (.jar)
file-multimediaMultimedia file vulnerabilities. (mp3, movies, wmv)
file-officeMicrosoft Office suite of software vulnerabilities. (Excel, PowerPoint, Word, Visio, Access, Outlook, etc)
file-pdfPDF file vulnerabilities.
file-otherFile vulnerabilities, that do not fit into the other categories.
fingerFinger service that runs by default on many Unix-based operating systems.
ftpFTP service.
icmp-infoFor troubleshooting a specific ICMP problem on the network, but in general it just generates noise and should remain disabled.
icmpPings specific to particular attack tools.
imapIMAP email service.
indicator-compromiseThe detection of a positively compromised system; false positives may occur.
indicator-obfuscationThe detection of obfuscated content. Like encoded JavaScript rules.
indicator-shellcodeDetection of Shellcode. This replaces the old “shellcode.rules”.
indicator-scanDetection of network scanning. This replaces the old “scan.rules”.
infoFor troubleshooting.
localLocal rules you create.
malware-backdoorDetection of traffic destined to known listening backdoor command channels.
malware-cncIdentified botnet traffic.
malware-otherMalware related, but do not fit into one of the other malware categories.
malware-toolsMalicious in nature.
miscMiscellanious rules that do not fit easily into another category.
multimediaStreaming media.Y
mysqlUnusual and potentially malicious MySQL traffic.
netbiosAdministrative share access alerts on SMB and NetBIOS access.
nntpNNTP (Network time protocol servers).
oracleOracle database servers.
os-linuxVulnerabilities in Linux based OSes. Not for browsers or any other software on it, but simply against the OS itself.
os-solarisVulnerabilities in Solaris based OSes. Not for any browsers or any other software on top of the OS.
os-windowsVulnerabilities in Windows based OSes. Not for any browsers or any other software on top of the OS.
os-mobileVulnerabilites in Mobile based OSes. Not for any browsers or any other software on the top of the OS.
os-otherVulnerabilities in an OS that is not listed above.
other-idsThe use of other IDSs.
p2pThe use of P2P (peer to peer software) protocols.Y
phishing-spamPhishing spam.
policyPolicy rules, including use of PC Anywhere and VNC traffic, or an anonymous FTP login.Y
policy-multimediaPotential violations of policy for multimedia, such as the use of iTunes on the network.Y
This is not for vulnerabilities found within multimedia files, as that would be in file-multimedia.
policy-otherMay violate the end-users corporate policy but do not fall into any of the other policy categories first.Y
policy-socialPotential violations of policy on corporate networks for the use of social media. (p2p, chat, etc).Y
policy-spamPotential spam on the network.Y
pop2POP2 email service.
pop3POP3 email service.
pornPorn.Y
protocol-dnsThe presence of DNS protocol or vulnerabilities on the network.
protocol-fingerThe presence of the finger protocol or vulnerabilities on the network.
protocol-ftpThe presence of the FTP protocol or vulnerabilities on the network.
protocol-icmpThe presence of ICMP traffic or vulnerabilities on the network.
protocol-imapThe presence of the IMAP protocol or vulnerabilities on the network.
protocol-nntpThe presence of the NNTP protocol or vulnerabilities on the network.
protocol-otherPotential vulnerabilties in protocols, that do not fit into one of the other “protocol” rule files.
protocol-popThe presence of the POP protocol or vulnerabilities on the network.
protocol-rpcThe presence of the RPC protocol or vulnerabilities on the network.
protocol-scadaThe presence of SCADA protocols or vulnerabilities on the network.
protocol-servicesThe presence of the rservices protocol or vulnerabilities on the network.
protocol-snmpThe presence of the SNMP protocol or vulnerabilities on the network.
protocol-telnetThe presence of the telnet protocol or vulnerabilities on the network.
protocol-tftpThe presence of the TFTP protocol or vulnerabilities on the network.
protocol-voipThe presence of VOIP services or vulnerabilities on the network.
pua-adwarePotentially Unwanted Applications (pau) that deal with adware or spyware.
pua-otherPotentially Unwanted Applications (pau) that do not fit into one of the “pau” categories.
pua-p2pPotentially Unwanted Applications (pau) that deal with p2p.
pua-toolbarsPotentially Unwanted Applications (pau) that deal with toolbars installed on the client system. (Google Toolbar, Yahoo Toolbar, Hotbar, etc)
rpcRPC (Remote Procedure Call).
rservicesThe use of rservices commands to control remote systems, including rlogin, rsh, and rexec.
scadaScada.
scanNetwork scanners, including port scanning, IP mapping, and various application scanners.
server-apacheApache Web Server.
server-iisMicrosoft IIS Web server.
server-mailMail servers. (Exchange, Courier).
These are separate from the protocol categories, as those deal with the traffic going to the mail servers itself.
server-mssqlMicrosoft SQL Server.
server-mysqlOracle MySQL server.
server-oracleOracle DB Server.
server-otherVulnerabilities or attacks against servers that are not detailed in other “server” categories.
server-sambaSamba Servers.
server-webappWeb based applications on servers.
shellcodeDetects shellcode in the packet payload.
WARNING: Since these rules are designed the check the payloads of all traffic, they can cause a significant performance hit when enabled.
smtpSMTP email service.
snmpSNMP traffic. SNMP is used to manage devices on a network.
specific-threats
spyware-putSpyware.
sqlSQL injection or other vulnerabilities against SQL like servers.
telnetTelnet exploits and unpassword protected accounts.
tftpDEPRECIATED RULES. TFTP.
virusVirus. This rule set is not being actively maintained and the rules really just watch for a variety of file extensions transmitted in email traffic.
The real virus signatures are located within specific service rules now.
voipVOIP.
web-activexActiveX.
web-attacksWeb servers and Web form variable vulnerabilities.
web-cgiCGI (Common Gateway Interface) which web servers use to execute external programs.
web-clientBad things coming from users, and attacks against web users.
web-coldfusionColdfusion web application services.
web-frontpageFrontpage web authoring services.
web-iisMicrosoft Internet Information Server (IIS) web servers.
web-miscGeneric web attacks.
web-phpAttacks against web servers running PHP applications.
x11X11 usage or other vulnerabilities against X11 like servers.

References

ids/rule_categories/snort_rule_set_categories.1627128600.txt.gz · Last modified: 2021/07/24 12:10 by peter

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki