
ESR service routers. ESR-Series. Functionality description. Version 1.12.0
290
Step
Description
Command
Keys
5
Set the frequency for update
checking (optional).
esr(config-ips-upgrade-
user-server)# upgrade
interval <HOURS>
<HOURS> – update interval in
hours, from 1 to 240.
Default value: 24 hours
7.7.3 Recommended open rule update source
SSL Blacklist contains lists of 'bad' SSL certificates, i.e. certificates
in respect of which the fact of their use by malware and botnets has
been established. The lists contain SHA1 fingerprints of public keys
from SSL certificates.
https://feodotracker.abuse.ch/
Feodo Tracker – list of management servers for the Feodo Trojan.
Feodo (also known as Cridex or Bugat) is used by cybercriminals to
steal sensitive information in the field of electronic banking (credit
card information, logins/passwords) from users' computers.
Currently, there are four versions of the Trojan (versions A, B, C and
D), mainly distinguished by the infrastructure of control servers.
https://rules.emergingthreats.net/open/suricata/
rules/botcc.rules
These rules describe well-known botnets and control servers.
Sources:
, Zeus Tracker, Palevo Tracker, Feodo
Tracker, Ransomware Tracker.
https://rules.emergingthreats.net/open/suricata/
rules/ciarmy.rules
These rules describe malicious hosts by the classification of the
project.
https://rules.emergingthreats.net/open/suricata/
rules/compromised.rules
These rules describe well-known compromised and malicious
hosts.
Ыщгксуы
: Daniel Gerzo’s BruteForceBlocker, The OpenBL,
Emerging Threats Sandnet, SidReporter Projects.
https://rules.emergingthreats.net/open/suricata/
rules/drop.rules
These rules describe spammer hosts/networks by the classification
of the
https://rules.emergingthreats.net/open/suricata/
rules/dshield.rules
These rules describe malicious hosts by the classification of the
https://rules.emergingthreats.net/open/suricata/
rules/emerging-activex.rules
These rules contain signatures for using ActiveX content.
https://rules.emergingthreats.net/open/suricata/
rules/emerging-attack_response.rules
Rules that detect host behavior after successful attacks.
https://rules.emergingthreats.net/open/suricata/
rules/emerging-chat.rules
These rules describe signs of accessing popular chat rooms.