IP Spoof Attack
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
This rule logs IP spoofing behavior identified by the firewall, where the source address of packets appears illegitimate or conflicting with known interfaces.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "DETECTION_ACTION_NETWORK_IP_SPOOF_ATTACK" select Action1.HOSTNAME,Action1.IDS_NAME,Action1.ACTION,Action1.MSG_ID,Action1.EVENTID,Action1.TYPE,Action1.SUBTYPE,Action1.DEVICETYPE,Action1.USERNAME,Action1.SOURCE_IP,Action1.TYPESOURCE,Action1.TYPEFACILITY,Action1.THREAT_ID,Action1.IDS_STATUS,Action1.MESSAGE
Detection
Execution Mode
realtime
Log Sources
Network


