-
Notifications
You must be signed in to change notification settings - Fork 183
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FP "DNS resolution without connection" in CTU-Normal-32/2017-05-02_normal_pcap #1167
Comments
Same FP in this evidence |
That FP is because slips generated the "DNS without connection" evidence way before it read the connection from conn.log |
I had an idea to make profiler process flows in 3 parallel threads |
sebastian's purposed solution
|
also set the threat level of this detection to info |
i'm concerned that this approach to detect "dns without connection" evidence will cause the evidence to be set after 30 mins of the dns flow, and the timewindow of that evidence may have been closed, that would cause us to detect the tw as malicious way after it ends. but this doesnt matter since the threat level of it is info. this will be an issue if we ever decide to increase the threat level for example if this evidence is threat level critical in the future, and we set it after 30 mins of the original DNS flow (lets say that dns arrived at the end of the timewindow) then, then we might be detecting that timewindow as malicious, 30 mins (zeek time) after it ended. will put this comment in the code too. |
Fixed here #1184 |
cmd: ./slips.py -e 1 -f /data/Normal/CTU-Normal-32/2017-05-02_normal.pcap -o output/Normal/CTU-Normal-32/2017-05-02_normal_pcap/1 -m -c config/generated_config_files/experiments_CTU-Normal-32_0.8_threshold.yaml
FP : domain (domain time-inc-zwpajagg7p.xid.segment.com, ip 34.208.103.162)
The text was updated successfully, but these errors were encountered: