Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
43 commits
Select commit Hold shift + click to select a range
b407f95
Minor readability changes
petrmiculek May 28, 2019
8405d22
Minor readability changes
petrmiculek May 28, 2019
3b5b7d8
Minor readability changes
petrmiculek May 28, 2019
22b9cdf
Updated READMEs
petrmiculek May 30, 2019
3b06fc7
Rework in progress
petrmiculek Jun 3, 2019
38c115f
Changes I did not make
petrmiculek Jun 3, 2019
49d3df5
Readability changes
petrmiculek Jun 6, 2019
56f8898
Minor changes
petrmiculek Jun 10, 2019
182a6f6
Refactoring
petrmiculek Jun 10, 2019
716654b
More refactoring, signature flags now in record.h
petrmiculek Jun 10, 2019
79f6c60
Bit more cleaning up
petrmiculek Jun 10, 2019
51f5ed5
Aesthetic changes
petrmiculek Jun 12, 2019
7018a3f
Aesthetic changes, host.cpp if conditions simplified
petrmiculek Jun 12, 2019
e56e806
Aesthetic changes - renaming
petrmiculek Jun 12, 2019
dad4092
Switched calculating target matched/total ratio, !review truncation err!
petrmiculek Jun 12, 2019
7630306
Aesthetic changes
petrmiculek Jun 13, 2019
24be9c8
Renamed HostTimeout, simplified keepTrackingHost of checkForAttack
petrmiculek Jun 13, 2019
265fb34
Improvement on keepTrackingHost part of checkForAttack
petrmiculek Jun 13, 2019
a033913
Mostly aesthetic changes
petrmiculek Jun 14, 2019
33e9de8
Removed unnecessary variables, merged checkForTimeout functions,
petrmiculek Jun 18, 2019
3052468
Removed more unnecessary variables, reports don't show matched count
petrmiculek Jun 18, 2019
443cac0
Renamed attack states
petrmiculek Jun 28, 2019
521393a
Clarified portscans, minor changes
petrmiculek Sep 18, 2019
647d4d9
Reverted part of 3052468
petrmiculek Jun 18, 2019
be3d553
Renamed attack states
petrmiculek Jun 28, 2019
9c363c3
Clarified portscans, minor changes
petrmiculek Sep 18, 2019
cfaf279
Reverted deleting of some variables
petrmiculek Sep 19, 2019
c42c023
Revert "Reverted deleting of some variables"
petrmiculek Sep 19, 2019
39d0ff4
fixed attack names after rebasing
petrmiculek Sep 19, 2019
afd1d53
reverted evaluation of portscan-matched
petrmiculek Sep 19, 2019
8d6b581
Merge remote-tracking branch 'cesnet-fork/updates' into bruteforce-re…
petrmiculek Sep 19, 2019
f36326f
Minor changes
petrmiculek Sep 19, 2019
63e9108
Fixed some config var names
petrmiculek Sep 19, 2019
8fe3b5e
Simplified attack evaluation, % of matched flows separate for each proto
petrmiculek Sep 20, 2019
0e281e0
Reformatting, var names changes, fixes to default config
petrmiculek Sep 20, 2019
dd11d1f
Reformatting, var names changes, fixes to default config
petrmiculek Sep 20, 2019
eb94af0
Merge remote-tracking branch 'cesnet-fork/updates' into bruteforce-re…
petrmiculek Sep 20, 2019
48aec36
travis build fix
petrmiculek Sep 20, 2019
a81800e
travis build fix
petrmiculek Sep 20, 2019
fba0a08
Merge remote-tracking branch 'cesnet-fork/updates' into bruteforce-re…
petrmiculek Sep 20, 2019
903676c
Adhering to c++03
petrmiculek Sep 23, 2019
fc9b09c
Revert "Changes I did not make"
petrmiculek Sep 25, 2019
21a04cf
Revert "Changes I did not make"
petrmiculek Dec 26, 2019
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 1 addition & 2 deletions Makefile.am
Original file line number Diff line number Diff line change
@@ -1,5 +1,4 @@
ACLOCAL_AMFLAGS = -I m4

SUBDIRS=amplification_detection \
blacklistfilter \
blacklistfilter/adaptive_filter \
Expand Down Expand Up @@ -51,7 +50,7 @@ deb:
make distdir && cd nemea-detectors-@VERSION@ && debuild -i -us -uc -b
else
endif

deb-clean:
rm -rf nemea-detectors_*.build* nemea-detectors_*.changes nemea-detectors*.deb nemea-detectors_*.orig.tar.gz nemea-detectors-*.tar.gz nemea-detectors-@VERSION@

Expand Down
6 changes: 6 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,8 +5,14 @@ This repository contains modules with the following detection capabilities:

* [amplification_detection](amplification_detection): universal detector of DNS/NTP/... amplification attacks
* [blacklistfilter](blacklistfilter): module that checks whether observed IP addresses are listed in any of given public-available blacklists
* [brute_force_detector](brute_force_detector): detector of brute-force attacks over SSH, RDP and TELNET.
* [ddos_detector](ddos_detector): detector of DDoS attacks
* [haddrscan_detector](haddrscan_detector): detector of horizontal scans
* [hoststatsnemea](hoststatsnemea): universal detection module based on computation of statistics about hosts, it can detect some types of DoS, DDoS, scanning
* [miner_detector](miner_detector): detector of crypto mining hosts.
* [sip_bf_detector](sip_bf_detector): detector of brute-force attacks attempting to breach passwords of users on SIP (Session Initiation Protocol) devices
* [smtp_spam_detector](smtp_spam_detector): detector of spam sources
* [tunnel_detection](tunnel_detection): detector of communication tunnels over DNS (e.g. using iodine or tcp2dns)
* [voip_fraud_detection](voip_fraud_detection): detector of guessing dial scheme of Session Initiation Protocol (SIP)
* [vportscan_detector](vportscan_detector): detector of vertical scans based on TCP SYN
* [waintrusion_detector](waintrusion_detector): detector of attacks on web applications
1 change: 0 additions & 1 deletion brute_force_detector/Makefile.am
Original file line number Diff line number Diff line change
@@ -1,4 +1,3 @@

bin_PROGRAMS=brute_force_detector
brute_force_detector_SOURCES=telnet_server_profile.cpp telnet_server_profile.h record.h record.cpp brute_force_detector.h brute_force_detector.cpp config.h config.cpp host.h host.cpp sender.h sender.cpp whitelist.cpp whitelist.h fields.c fields.h
whitelist_unit_test_SOURCES=whitelist_unit_test.cpp whitelist.h whitelist.cpp
Expand Down
9 changes: 2 additions & 7 deletions brute_force_detector/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,13 +46,8 @@ Unirec template for output interface is `DETECTION_TIME,WARDEN_TYPE,SRC_IP,PROTO
* `PROTOCOL` : TCP protocol number
* `DST_PORT` : Port of the attacked service
* `EVENT_SCALE` : Scale of the detected event
* `NOTE` : This field contains (comma is used as separator):
1. Total number of targets since start of the attack from both
directions separated by a dash
2. Flag if the scan is performed
3. Number of suspicious flows from both directions and since
last report separated by a dash

* `NOTE` : This field contains (comma is used as separator):
"I: (list of incoming attacker IPs), O: (list of outgoing attacked IPs)"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is great that this description was updated.
However, it still seems strange... even though the description is more accurate now, who is an attacker and who is under attack? We expected that SRC_IP is always an attacker. When there is something on the "list of incoming attacker IPs" , is SRC_IP a victim for these IPs?

I think the output of the module should describe who is an attacker and victim more clearly...


How to use
----------
Expand Down
Loading