Skip to content

Commit

Permalink
Add Sigma rule
Browse files Browse the repository at this point in the history
  • Loading branch information
mostafa committed May 19, 2024
1 parent aac17a5 commit 9589aa0
Show file tree
Hide file tree
Showing 2 changed files with 30 additions and 0 deletions.
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@
- **Syntax-based detection**: Detects SQL injection attacks by parsing incoming queries and checking for suspicious syntax using `libinjection`
- Prevents SQL injection attacks by blocking malicious queries from reaching the database server, and returning an error to the client instead
- Logs an audit trail for detections containing the query and the prediction score
- Sigma rule for detection in SIEM systems
- Prometheus metrics for quantifying detections
- Logging
- Configurable via environment variables
Expand Down
29 changes: 29 additions & 0 deletions rules/gatewayd/sql-injection-detected.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
title: SQL injection detected
description: Detects SQL injection attacks detected by the IDS/IPS plugin
references:
- http://www.sqlinjection.net/
- https://attack.mitre.org/techniques/T1190/
- https://owasp.org/Top10/A03_2021-Injection/
- https://capec.mitre.org/data/definitions/66.html
- https://cwe.mitre.org/data/definitions/89.html
author: Mostafa Moradian <[email protected]>
date: 2024/05/19
tags:
- attack.initial_access
- attack.t1190
- owasp.a03
- capec.66
- cwe.89
logsource:
product: gatewayd
service: gatewayd-plugin-sql-ids-ips
detection:
selection:
detector: deep_learning_model
score|gte: 0.8
keywords:
- "SQL injection detected"
condition: selection and keywords
falsepositives:
- Certain queries like accessing database schema may trigger this alert
level: high

0 comments on commit 9589aa0

Please sign in to comment.