This file is indexed.

/etc/prelude-lml/ruleset/arbor.rules is in prelude-lml-rules 4.1.0-1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
#FULLNAME: Arbor
#VERSION: 1.0
#DESCRIPTION: Arbor Networks provides several products, designed to protect against DDoS and detect Advanced Threats through NetFlow and packet capture.

#####
#
# Copyright (C) 2005 Herve Debar <herve dot debar at francetelecom dot com>
# All Rights Reserved
#
# This file is part of the Prelude-LML program.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2, or (at your option)
# any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License along
# with this program; if not, write to the Free Software Foundation, Inc.,
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
#
#####

#DESCRIPTION:Arbor Anomaly
#CATEGORY:Network Security
#LOG:Apr 17 06:52:57 arbordos.mynetwork.net pfDoS: anomaly Protocol id 92480 status ongoing severity 5 src 0.0.0.0/0 All dst 2.2.0.0/16 Intellig_ start 2005-04-17 06:45:41 +0200 duration 360 percent 214.27 rate 5e+06 rateUnit bps protocol tcp flags nil url https://doscont/anomaly/?attack_id=92480
regex=anomaly ([a-zA-Z_-]+) id (\d+) status (\w+) severity (\d+) src ([\d\.\/]+) \w+ dst ([\d\.\/]+) \w+ start ([\d\- :\+]+) duration (\d+) percent (\d+\.?\d*) rate ([\de\+\-]+) rateUnit (\w+) protocol (\w+) flags (\w+) url (\S+); \
 classification.text=Arbor Anomaly $1; \
 classification.reference(0).origin=vendor-specific; \
 classification.reference(0).meaning=arbor_id; \
 classification.reference(0).name=$2; \
 classification.reference(0).url=http://www.arbornetworks.com/; \
 classification.reference(1).origin=vendor-specific; \
 classification.reference(1).meaning=arbor_status; \
 classification.reference(1).name=$3; \
 classification.reference(1).url=http://www.arbornetworks.com/; \
 classification.reference(2).origin=vendor-specific; \
 classification.reference(2).meaning=arbor_severity; \
 classification.reference(2).name=$4; \
 classification.reference(2).url=http://www.arbornetworks.com/; \
 id=4300; \
 revision= 1; \
 analyzer(0).name=ArborDos; \
 analyzer(0).manufacturer=Arbor; \
 assessment.impact.type=dos; \
 assessment.impact.severity=medium; \
 assessment.impact.description=DDoS attack $3 detected; \
 source(0).node.address(0).category=ipv4-net; \
 source(0).node.address(0).address=$5; \
 target(0).node.address(0).category=ipv4-net; \
 target(0).node.address(0).address=$6; \
 additional_data(0).type=date-time; \
 additional_data(0).meaning=Attack start time; \
 additional_data(0).data=$7; \
 additional_data(1).type=integer; \
 additional_data(1).meaning=Attack duration in seconds; \
 additional_data(1).data=$8; \
 additional_data(2).type=real; \
 additional_data(2).meaning=arbor percent; \
 additional_data(2).data=$9; \
 additional_data(3).type=real; \
 additional_data(3).meaning=Traffic rate in $11; \
 additional_data(3).data=$10; \
 additional_data(4).type=string; \
 additional_data(4).meaning=Attack protocol; \
 additional_data(4).data=$12; \
 additional_data(5).type=string; \
 additional_data(5).meaning=Protocol flags; \
 additional_data(5).data=$13; \
 additional_data(6).type=string; \
 additional_data(6).meaning=Detailed information; \
 additional_data(6).data=$14; \
 last

#DESCRIPTION:Arbor Anomaly Router
#CATEGORY:Network Security
#LOG:Apr 17 06:52:57 arbordos.mynetwork.net pfDoS: anomaly Protocol id 92480 status ongoing severity 5 router 1.2.3.4 interface 14 incoming
regex=anomaly ([a-zA-Z_-]+) id (\d+) status (\w+) severity (\d+) router ([\d\./]+) interface (\S+) (\S+); \
 classification.text=Arbor Anomaly Router $1; \
 classification.reference(0).origin=vendor-specific; \
 classification.reference(0).meaning=arbor_id; \
 classification.reference(0).name=$2; \
 classification.reference(0).url=http://www.arbornetworks.com/; \
 classification.reference(1).origin=vendor-specific; \
 classification.reference(1).meaning=arbor_status; \
 classification.reference(1).name=$3; \
 classification.reference(1).url=http://www.arbornetworks.com/; \
 classification.reference(2).origin=vendor-specific; \
 classification.reference(2).meaning=arbor_severity; \
 classification.reference(2).name=$4; \
 classification.reference(2).url=http://www.arbornetworks.com/; \
 id=4301; \
 revision= 1; \
 analyzer(0).name=ArborDos; \
 analyzer(0).manufacturer=Arbor; \
 assessment.impact.type=dos; \
 assessment.impact.severity=medium; \
 assessment.impact.description=DDoS attack $3 detected at router; \
 additional_data(0).type=string; \
 additional_data(0).meaning=Router; \
 additional_data(0).data=$5; \
 additional_data(1).type=integer; \
 additional_data(1).meaning=Interface; \
 additional_data(1).data=$6; \
 additional_data(2).type=string; \
 additional_data(2).meaning=Direction; \
 additional_data(2).data=$7; \
 last

#DESCRIPTION:Arbor Collector
#CATEGORY:Network Security
regex=collector (\S+) (\S+) since (.+) duration (\d+); \
 classification.text=Arbor Collector; \
 id=4302; \
 revision=1; \
 analyzer(0).name=ArborDos; \
 analyzer(0).manufacturer=Arbor; \
 assessment.impact.description=DDoS attack measurement; \
 additional_data(0).type=string; \
 additional_data(0).meaning=Collector; \
 additional_data(0).data=$1; \
 additional_data(1).type=string; \
 additional_data(1).meaning=Status; \
 additional_data(1).data=$2; \
 additional_data(2).type=date-time; \
 additional_data(2).meaning=Since; \
 additional_data(2).data=$3; \
 additional_data(3).type=integer; \
 additional_data(3).meaning=Duration; \
 additional_data(3).data=$4; \
 last

#DESCRIPTION:Arbor Netflow
#CATEGORY:Network Security
regex=internalError location (\S+) reason (\S+) since (.+) duration (\d+); \
 classification.text=Arbor Netflow; \
 id=4303; \
 revision=1; \
 analyzer(0).name=ArborDos; \
 analyzer(0).manufacturer=Arbor; \
 assessment.impact.description=DDoS attack measurement; \
 additional_data(0).type=string; \
 additional_data(0).meaning=Location; \
 additional_data(0).data=$1; \
 additional_data(1).type=string; \
 additional_data(1).meaning=Reason; \
 additional_data(1).data=$2; \
 additional_data(2).type=date-time; \
 additional_data(2).meaning=Since; \
 additional_data(2).data=$3; \
 additional_data(3).type=integer; \
 additional_data(3).meaning=Duration; \
 additional_data(3).data=$4; \
 last

#DESCRIPTION:Arbor DarkIP
#CATEGORY:Network Security
#LOG:Apr 17 07:31:22 arbordos.mynetwork.net pfDoS: rtr 1.2.3.4 rtrSampleRate 1000 proto 17 src 192.168.0.69 dst 1.2.3.4 dstPort 11328 firstSeen 2005-04-17 06:31:46 +0200 lastSeen 2005-04-17 06:31:46 +0200 bytes 53 pkts 1 flows 1
regex=rtr ([\d\.\/]+) rtrSampleRate (\d+) proto (\d+) src ([\d\.\/]+) dst ([\d\.\/]+) dstPort (\d+) firstSeen ([\d\- :\+]+) lastSeen ([\d\- :\+]+) bytes (\d+) pkts (\d+) flows (\d+); \
 classification.text=Arbor DarkIP; \
 id=4304; \
 revision=1; \
 analyzer(0).name=ArborDos; \
 analyzer(0).manufacturer=Arbor; \
 assessment.impact.description=DDoS attack measurement; \
 source(0).node.address(0).category=ipv4-net; \
 source(0).node.address(0).address=$4; \
 target(0).node.address(0).category=ipv4-net; \
 target(0).node.address(0).address=$5; \
 target(0).service.port=$6; \
 additional_data(0).type=string; \
 additional_data(0).meaning=Router; \
 additional_data(0).data=$1; \
 additional_data(1).type=integer; \
 additional_data(1).meaning=Router sample rate; \
 additional_data(1).data=$2; \
 additional_data(2).type=integer; \
 additional_data(2).meaning=Protocol; \
 additional_data(2).data=$3; \
 additional_data(3).type=string; \
 additional_data(3).meaning=first seen; \
 additional_data(3).data=$7; \
 additional_data(4).type=string; \
 additional_data(4).meaning=last seen; \
 additional_data(4).data=$8; \
 additional_data(5).type=integer; \
 additional_data(5).meaning=bytes; \
 additional_data(5).data=$9; \
 additional_data(6).type=integer; \
 additional_data(6).meaning=packets; \
 additional_data(6).data=$10; \
 additional_data(7).type=integer; \
 additional_data(7).meaning=flows; \
 additional_data(7).data=$11; \
 last