SigmaHQ/rules/network/net_high_dns_requests_rate.yml

36 lines
905 B
YAML
Raw Normal View History

2019-10-25 02:30:55 +00:00
action: global
title: High DNS Requests Rate
2019-10-25 02:30:55 +00:00
status: experimental
2020-09-15 13:02:30 +00:00
description: High DNS requests amount from host per short period of time
2019-10-25 02:30:55 +00:00
author: Daniil Yugoslavskiy, oscd.community
date: 2019/10/24
modified: 2020/08/27
2020-09-15 13:02:30 +00:00
falsepositives:
- Legitimate high DNS requests rate to domain name which should be added to whitelist
level: medium
2019-10-25 02:30:55 +00:00
tags:
- attack.exfiltration
- attack.t1048 # an old one
- attack.t1048.003
- attack.command_and_control
- attack.t1071 # an old one
- attack.t1071.004
2019-10-25 02:30:55 +00:00
---
2021-09-02 18:07:03 +00:00
id: b4163085-4001-46a3-a79a-55d8bbbc7a3a
2019-10-25 02:30:55 +00:00
logsource:
category: dns
detection:
selection:
query: '*'
timeframe: 1m
condition: selection | count() by src_ip > 1000
---
2021-09-02 18:07:03 +00:00
id: 51186749-7415-46be-90e5-6914865c825a
2019-10-25 02:30:55 +00:00
logsource:
category: firewall
detection:
selection:
dst_port: 53
timeframe: 1m
condition: selection | count() by src_ip > 1000