Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Understanding Predefined IDP Attack Objects and Object Groups

    The security package for Intrusion Detection and Prevention (IDP) contains a database of predefined IDP attack objects and IDP attack object groups that you can use in IDP policies to match traffic against known and unknown attacks. Juniper Networks updates the predefined attack objects and groups on a regular basis with newly discovered attack patterns.

    Updates to the attack object database can include:

    • New descriptions or severities for existing attack objects
    • New attack objects
    • Deletion of obsolete attack objects

    This topic includes the following sections:

    Predefined Attack Objects

    Predefined attack objects are listed in an alphabetical order. These attack objects have unique names that help you identify the attack. The first part of the name indicates the group to which the attack object belongs. For example:

    • FTP:USER:ROOT—Belongs to the FTP:USER group. It detects attempts to log in to an FTP server using the root account.
    • HTTP:HOTMAIL:FILE-UPLOAD—Belongs to the HTTP:HOTMAIL group. It detects files attached to e-mails sent via the Web-based e-mail service Hotmail.

    Predefined Attack Object Groups

    The predefined attack groups list displays the attack objects in the categories described below. A set of recommended attack objects that Juniper Networks considers to be serious threats are also available in this list. The recommended attack objects are organized into the following categories:

    Table 1: Predefined Attack Object Groups

    Attack Object Group

    Description

    Attack Type

    Groups attack objects by type (anomaly or signature). Within each type, attack objects are grouped by severity.

    Category

    Groups attack objects by predefined categories. Within each category, attack objects are grouped by severity.

    Operating System

    Groups attack objects by the operating system to which they apply: BSD, Linux, Solaris, or Windows. Within each operating system, attack objects are grouped by services and severity.

    Severity

    Groups attack objects by the severity assigned to the attack. IDP has five severity levels: Critical, Major, Minor, Warning, Info. Within each severity, attack objects are grouped by category.

    Web Services

    Groups attack objects by common Web services. These services are grouped by severity levels—Warning, Critical, Major, Minor, Info.

    Miscellaneous

    Groups attack objects by performance level. Attack objects affecting IDP performance over a certain level are grouped under this category.

    Response

    Groups attack objects in traffic flowing in the server to client direction.

    Published: 2012-06-29