시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
1,3612015/01/20 2003035  ET POLICY Known SSL traffic on port 3128 (proxy) being excluded from SSL Alerts; [1
1,3602015/01/20 2003034  ET DELETED Trojan.Downloader.Time2Pay.AQ; [1,2
1,3592015/01/20 2003033  ET POLICY Known SSL traffic on port 2967 (Symantec) being excluded from SSL Alerts; [1
1,3582015/01/20 2003032  ET CHAT Known SSL traffic on port 5223 (Jabber) being excluded from SSL Alerts; [1
1,3572015/01/20 2003031  ET CHAT Known SSL traffic on port 5222 (Jabber) being excluded from SSL Alerts; [1
1,3562015/01/20 2003030  ET POLICY Known SSL traffic on port 8443 being excluded from SSL Alerts; [1
1,3552015/01/20 2003029  ET POLICY Known SSL traffic on port 8200 being excluded from SSL Alerts; [1
1,3542015/01/20 2003028  ET POLICY Known SSL traffic on port 8080 being excluded from SSL Alerts; [1
1,3532015/01/20 2003027  ET POLICY Known SSL traffic on port 8000 being excluded from SSL Alerts; [1
1,3522015/01/20 2003026  ET POLICY Known SSL traffic on port 443 being excluded from SSL Alerts; [1
1,3512015/01/20 2003025  ET DELETED Unknown Web Bot Controller Accessed; [1
1,3502015/01/20 2003023  ET WEB_CLIENT IE StructuredGraphicsControl SourceURL Bug MoBB#6; [1,2
1,3492015/01/20 2003022  ET CHAT Skype Bootstrap Node (udp); [1,2
1,3482015/01/20 2003021  ET POLICY TLS/SSL Encrypted Application Data on Unusual Port SSLv3; [1
1,3472015/01/20 2003020  ET POLICY TLS/SSL Encrypted Application Data on Unusual Port; [1
1,3462015/01/20 2003019  ET POLICY TLS/SSL Server Cipher Set on Unusual Port SSLv3; [1
1,3452015/01/20 2003018  ET POLICY TLS/SSL Server Cipher Set on Unusual Port; [1
1,3442015/01/20 2003017  ET DELETED TLS/SSL Server Hello Done on Unusual Port SSLv3; [1
1,3432015/01/20 2003016  ET DELETED TLS/SSL Server Hello Done on Unusual Port; [1
1,3422015/01/20 2003015  ET POLICY TLS/SSL Server Key Exchange on Unusual Port SSLv3; [1
1,3412015/01/20 2003014  ET POLICY TLS/SSL Server Key Exchange on Unusual Port; [1
1,3402015/01/20 2003013  ET POLICY TLS/SSL Server Certificate Exchange on Unusual Port SSLv3; [1
1,3392015/01/20 2003012  ET POLICY TLS/SSL Server Certificate Exchange on Unusual Port; [1
1,3382015/01/20 2003011  ET POLICY TLS/SSL Server Hello on Unusual Port SSLv3; [1
1,3372015/01/20 2003010  ET POLICY TLS/SSL Server Hello on Unusual Port; [1
1,3362015/01/20 2003009  ET POLICY TLS/SSL Client Cipher Set on Unusual Port SSLv3; [1
1,3352015/01/20 2003008  ET POLICY TLS/SSL Client Cipher Set on Unusual Port; [1
1,3342015/01/20 2003007  ET POLICY TLS/SSL Client Key Exchange on Unusual Port SSLv3; [1
1,3332015/01/20 2003006  ET POLICY TLS/SSL Client Key Exchange on Unusual Port; [1
1,3322015/01/20 2003005  ET POLICY TLS/SSL Client Hello on Unusual Port SSLv3; [1
1,3312015/01/20 2003004  ET POLICY TLS/SSL Client Hello on Unusual Port Case 2; [1
1,3302015/01/20 2003003  ET POLICY TLS/SSL Client Hello on Unusual Port SSLv3; [1
1,3292015/01/20 2003002  ET POLICY TLS/SSL Client Hello on Unusual Port TLS; [1
1,3282015/01/20 2003000  ET MALWARE PopupSh.ocx Access Attempt; [1
1,3272015/01/20 2002999  ET MALWARE /jk/exp.wmf Exploit Code Load Attempt; [1
1,3262015/01/20 2002998  ET DELETED HELO Non-Displayable Characters MailEnable Denial of Service; [1
1,3252015/01/20 2002997  ET WEB_SERVER PHP Remote File Inclusion (monster list http); [1,2
1,3242015/01/20 2002996  ET WEB_SPECIFIC_APPS GeekLog Remote File Include Vulnerability; [1,2
1,3232015/01/20 2002995  ET SCAN Rapid IMAPS Connections - Possible Brute Force Attack; [1
1,3222015/01/20 2002994  ET SCAN Rapid IMAP Connections - Possible Brute Force Attack; [1
1,3212015/01/20 2002993  ET SCAN Rapid POP3S Connections - Possible Brute Force Attack; [1
1,3202015/01/20 2002992  ET SCAN Rapid POP3 Connections - Possible Brute Force Attack; [1
1,3192015/01/20 2002991  ET MALWARE Possible Spambot getting new exe; [1
1,3182015/01/20 2002990  ET MALWARE Possible Spambot Pulling IP List to Spam; [1
1,3172015/01/20 2002989  ET DELETED Possible Spambot getting new exe url; [1
1,3162015/01/20 2002988  ET MALWARE Possible Spambot Checking in to Spam; [1
1,3152015/01/20 2002987  ET MALWARE Jupitersatellites.biz Spyware Download; [1
1,3142015/01/20 2002984  ET MALWARE SpySherriff Spyware Activity; [1
1,3132015/01/20 2002983  ET TROJAN GENERAL Possible Trojan Sending Initial Email to Owner - SUCCESSO; [1
1,3122015/01/20 2002982  ET TROJAN GENERAL Possible Trojan Sending Initial Email to Owner - INFECTADO; [1
< 511  512  513  514  515  516  517  518  519  520 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.