heroui logo

Suspicious Log Entries

Sigma Rules

View Source
Summary
This detection rule targets Linux systems to identify suspicious log entries that may indicate harmful activities or configurations. The objective is to monitor specific keywords in the system's log files that are commonly associated with security incidents. Keywords for detection include 'entered promiscuous mode', which indicates the potential takeover of network interfaces for eavesdropping; 'Deactivating service', suggesting unauthorized cessation of critical services; 'Oversized packet received from', which may imply potential DDoS attacks; and 'imuxsock begins to drop messages', indicating a potential log overrun or malicious log manipulation. Such patterns are crucial for threat detection in environments where Linux systems operate, enabling timely response to potential threats.
Categories
  • Linux
  • Endpoint
  • Infrastructure
Data Sources
  • Logon Session
  • Application Log
Created: 2017-03-25