
Summary
This rule is designed to detect SIP (Session Initiation Protocol) requests received by an SIP service running on an OpenCanary node, a honeypot tool that emulates various services to attract and log intrusion attempts. It leverages the logging mechanism of OpenCanary to monitor specific log types associated with SIP requests. The detection logic relies on identifying log entries that classify as logtype 15001, which pertains to SIP traffic. Given the nature of this configuration, the rule is marked as experimental, indicating it may still undergo refinement and testing. Users should be aware of the low likelihood of false positives associated with this rule, making its alerts significant in the context of potentially malicious SIP activity.
Categories
- Network
- Cloud
- Application
Data Sources
- Application Log
Created: 2024-03-08