EasyManua.ls Logo

ELTEX ESR Series - Page 408

ELTEX ESR Series
575 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ESR-Series. User manual
408
https://
rules.emergingthreats.net/
open/suricata/rules/
botcc.rules
These rules describe well-known botnets and control servers. Sources:
Shadowserver.org, Zeus Tracker, Palevo Tracker, Feodo Tracker, Ransomware
Tracker.
https://
rules.emergingthreats.net/
open/suricata/rules/
ciarmy.rules
These rules describe malicious hosts by the classification of the www.cinsarmy.com
project.
https://
rules.emergingthreats.net/
open/suricata/rules/
compromised.rules
These rules describe well-known compromised and malicious hosts. Ыщгксуы:
Daniel Gerzo’s BruteForceBlocker, The OpenBL, Emerging Threats Sandnet,
SidReporter Projects.
https://
rules.emergingthreats.net/
open/suricata/rules/drop.rules
These rules describe spammer hosts/networks by the classification of the
www.spamhaus.org project.
https://
rules.emergingthreats.net/
open/suricata/rules/
dshield.rules
These rules describe malicious hosts by the classification of the www.dshield.org
project.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
activex.rules
These rules contain signatures for using ActiveX content.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
attack_response.rules
Rules that detect host behavior after successful attacks.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
chat.rules
These rules describe signs of accessing popular chat rooms.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
current_events.rules
Temporary rules awaiting possible inclusion in permanent rule lists.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
dns.rules
These rules contain signatures of vulnerabilities in the DNS protocol, signs of the use
of DNS by malware, and incorrect use of the DNS protocol.

Table of Contents

Related product manuals