Difference between revisions of "HIDS 60205"

From Atomicorp Wiki
Jump to: navigation, search
m
m (Notes)
 
(4 intermediate revisions by one user not shown)
Line 1: Line 1:
'''Rule ID'''
+
{{Infobox
 +
|header1= Rule 60205
 +
|label2 = Status
 +
|data2 = Active
 +
|label3 = Alert Message
 +
|data3 = Configured tresholds exceeded - Possible DoS attack
 +
}}
  
60205
+
= Description =
  
'''Status'''
+
''Log Example'''
  
Active rule currently published.
+
''hostname mod_evasive[12345]: Blacklisting address 1.2.3.4: possible DoS attack.''
  
''Message Example'''
+
This rule detects when the thresholds you have configured for the mod_evasive module are exceeded.  This may be a DOS attack, or this may mean that you need to increase the thresholds for your system.  For example, faster systems can handle more connections than slower systems. 
  
hostname mod_evasive[12345]: Blacklisting address 1.2.3.4: possible DoS attack.  
+
mod_evasive is a Denial Of Service detection module for apache, it detects when an IP address exceeds a connection threshold (Example: X connections in Y seconds, or X accesses for the same page from a single IP in Y seconds). These thresholds are configurable through ASL.
  
'''Description''' 
+
= Troubleshooting =
  
This rule detects when the mod_evasive module is triggered.  mod_evasive is a Denial Of Service detection module for apache, it detects when an IP address exceeds a connection threshold (Example: X connections in Y seconds, or X accesses for the same page from a single IP in Y seconds). 
+
== False Positives ==
 
+
'''False Positives'''
+
  
 
This rule can be falsely triggered if the configured thresholds for the system have been exceeded.
 
This rule can be falsely triggered if the configured thresholds for the system have been exceeded.
  
If you believe that this is a false positive, then either disable the DOS protections in ASL, increase the thresholds or whitelist the IP.  The section below provides a link to the process for doing this.
+
If you believe that the thresholds are too low for your system, please see the Solutions section below.
  
'''Tuning Recommendations'''
+
== Solutions ==
  
 
Please see the [[Mod_evasive]] wiki page for detailed guidance.
 
Please see the [[Mod_evasive]] wiki page for detailed guidance.
  
'''Similar Rules'''
+
[https://www.atomicorp.com/wiki/index.php/Mod_evasive#Solution_1:_Increase_the_thresholds_for_mod_evasive_to_be_less_sensitive Solution 1:  Increase the thresholds for mod_evasive to be less sensitive]
 +
 
 +
[https://www.atomicorp.com/wiki/index.php/Mod_evasive#Solution_2:_Whitelist_the_IPs Solution 2: Whitelist the IP]
 +
 
 +
[https://www.atomicorp.com/wiki/index.php/Mod_evasive#Solution_3:_Disable_mod_evasive_entirely Solution 3: Disable mod_evasive]
 +
 
 +
= Additional Information =
 +
 
 +
== Similar Rules ==
  
 
None.
 
None.
 +
 +
== Knowledge Base Articles==
 +
 +
None.
 +
 +
== Outside References ==
 +
 +
None.
 +
 +
== Notes ==
 +
 +
This event does not produce an audit log entry, as it does not use mod_security.

Latest revision as of 14:16, 11 November 2013

Rule 60205
Status Active
Alert Message Configured tresholds exceeded - Possible DoS attack

Contents

[edit] Description

Log Example'

hostname mod_evasive[12345]: Blacklisting address 1.2.3.4: possible DoS attack.

This rule detects when the thresholds you have configured for the mod_evasive module are exceeded. This may be a DOS attack, or this may mean that you need to increase the thresholds for your system. For example, faster systems can handle more connections than slower systems.

mod_evasive is a Denial Of Service detection module for apache, it detects when an IP address exceeds a connection threshold (Example: X connections in Y seconds, or X accesses for the same page from a single IP in Y seconds). These thresholds are configurable through ASL.

[edit] Troubleshooting

[edit] False Positives

This rule can be falsely triggered if the configured thresholds for the system have been exceeded.

If you believe that the thresholds are too low for your system, please see the Solutions section below.

[edit] Solutions

Please see the Mod_evasive wiki page for detailed guidance.

Solution 1: Increase the thresholds for mod_evasive to be less sensitive

Solution 2: Whitelist the IP

Solution 3: Disable mod_evasive

[edit] Additional Information

[edit] Similar Rules

None.

[edit] Knowledge Base Articles

None.

[edit] Outside References

None.

[edit] Notes

This event does not produce an audit log entry, as it does not use mod_security.

Personal tools