IDP Custom Attack Objects Service Contexts
You can create and manage your own custom attack objects in the IDP system. These objects are tailored to meet your specific security needs. They can be used to detect and prevent unique or emerging threats that might not be covered by default attack objects provided by the vendor.
IDP custom attack objects service contexts allow users to create and manage their own custom attack objects in the IDP system. These objects are tailored to meet specific security needs and can be used to detect and prevent unique or emerging threats that may not be covered by default attack objects provided by the vendor.
Service contexts are the specific conditions or criteria under which the custom attack objects are triggered. These contexts might include various network parameters, traffic types, application behaviors, or any other relevant criteria that can be used to detect anomalous or malicious activities.
The custom objects provide the flexibility to address specific threats and compliance requirements, offering a proactive defense strategy against emerging and unique security challenges
The service or application binding field specifies the service that the attack uses to enter your network.
Specify either the service or the protocol binding in a custom attack. In case, you specify both, the service binding takes precedence.
-
any—Specifyanyif you are unsure of the correct service and want to match the signature in all services. Because some attacks use multiple services to attack your network, you might want to select theAnyservice binding to detect the attack regardless of which service the attack chooses for a connection. -
service—Most attacks use a specific service to attack your network. You can select the specific service used to perpetrate the attack as the service binding.Table 1 displays supported services and default ports associated with the services.
Table 1: Supported Services for Service Bindings Service
Description
Default Port
aimAOL Instant Messenger. America Online (ISP) provides Internet, chat, and instant messaging applications.
TCP/5190
bgpBorder Gateway Protocol
TCP/179
chargenCharacter Generator Protocol is a UDP- or TCP-based debugging and measurement tool.
TCP/19, UDP/19
dhcpDHCP allocates network addresses and delivers configuration parameters from server to hosts.
UDP/67, UDP/68
discardDiscard protocol is an Application Layer protocol that describes a process for discarding TCP or UDP data sent to port 9.
TCP/9, UDP/9
dnsDNS translates domain names into IP addresses.
TCP/53, UDP/53
echoEcho
TCP/7, UDP/7
fingerFinger is a UNIX program that provides information about users.
TCP/79, UDP/79
ftpFTP allows the sending and receiving of files between machines.
TCP/21, UDP/21
gGnutellaGnutella is a public domain file sharing protocol that operates over a distributed network.
TCP/6346
gopherGopher organizes and displays Internet servers' contents as a hierarchically structured list of files.
TCP/70
h225rasH.225.0/RAS (Registration, Admission, and Status)
UDP/1718, UDP/1719
httpHyperText Transfer Protocol is the underlying protocol used by the World Wide Web (WWW).
TCP/80, TCP/81, TCP/88, TCP/3128, TCP/7001 (Weblogic), TCP/8000, TCP/8001, TCP/8100 (JRun), TCP/8200 (JRun), TCP/8080, TCP/8888 (Oracle-9i), TCP/9080 (Websphere), UDP/80
icmpInternet Control Message Protocol
identIdentification protocol is a TCP/IP Application Layer protocol used for TCP client authentication.
TCP/113
ikeInternet Key Exchange protocol (IKE) is a protocol to obtain authenticated keying material for use with ISAKMP.
UDP/500
imapInternet Message Access Protocol is used for retrieving messages.
TCP/143, UDP/143
ircInternet Relay Chat (IRC) allows people connected to the Internet to join live discussions.
TCP/6667
ldapLightweight Directory Access Protocol is a set of protocols used to access information directories.
TCP/389
lprLine Printer Daemon protocol is a TCP-based protocol used for printing applications.
TCP/515
msnMicrosoft Network Messenger is a utility that allows you to send instant messages and talk online.
TCP/1863
msrpcMicrosoft Remote Procedure Call
TCP/135, UDP/135
mssqlMicrosoft SQL is a proprietary database server tool that allows for the creation, access, modification, and protection of data.
TCP/1433, TCP/3306
mysqlMySQL is a database management system available for both Linux and Windows.
TCP/3306
nbdsNetBIOS Datagram Service application, published by IBM, provides connectionless (datagram) applications to PCs connected with a broadcast medium to locate resources, initiate sessions, and terminate sessions. It is unreliable and the packets are not sequenced.
UDP/137 (NBName), UDP/138 (NBDS)
nfsNetwork File System uses UDP to allow network users to access shared files stored on computers of different types. SUN RPC is a building block of NFS.
TCP/2049, UDP/2049
nntpNetwork News Transport Protocol is a protocol used to post, distribute, and retrieve USENET messages.
TCP/119
ntpNetwork Time Protocol provides a way for computers to synchronize to a time reference.
UDP/123
pop3Post Office Protocol is used for retrieving e-mail.
UDP/110, TCP/110
prtmapperService that runs on nodes on the Internet to map an ONC RPC program number to the network address of the server that listens for the program number.
TCP/111, UDP/111
radiusRemote Authentication Dial-In User Service application is a server program used for authentication and accounting purposes.
UDP/1812, UDP/1813
rexecRexec
TCP/512
rloginRLOGIN starts a terminal session on a remote host.
TCP/513
rshRSH executes a shell command on a remote host.
TCP/514
rtspReal-Time Streaming Protocol (RTSP) is for streaming media applications
TCP/554
sipSession Initiation Protocol (SIP) is an Application Layer control protocol for creating, modifying, and terminating sessions.
TCP/5060, UDP/5060
smbServer Message Block (SMB) over IP is a protocol that allows you to read and write files to a server on a network.
TCP/139, TCP/445
smtpSimple Mail Transfer Protocol is used to send messages between servers.
TCP/25, UDP/25
snmpSimple Network Management Protocol is a set of protocols for managing complex networks.
TCP/161, UDP/161
snmptrapSNMP trap
TCP/162, UDP/162
sqlmonSQL monitor (Microsoft)
UDP/1434
sshSSH is a program to log into another computer over a network through strong authentication and secure communications on a channel that is not secure.
TCP/22, UDP/22
sslSecure Sockets Layer
TCP/443, TCP/80
syslogSyslog is a UNIX program that sends messages to the system logger.
UDP/514
tlnetTelnet is a UNIX program that provides a standard method of interfacing terminal routers and terminal-oriented processes to each other.
TCP/23, UDP/23
tnsTransparent Network Substrate
TCP/1521, TCP/1522, TCP/1523, TCP/1524, TCP/1525, TCP/1526, TCP/1527, TCP/1528, TCP/1529, TCP/1530, TCP/2481, TCP/1810, TCP/7778
tftpTrivial File Transfer Protocol
UDP/69
vncVirtual Network Computing facilitates viewing and interacting with another computer or mobile router connected to the Internet.
TCP/5800, TCP/5900
whoisNetwork Directory Application Protocol is a way to look up domain names.
TCP/43
ymsgYahoo! Messenger is a utility that allows you to check when others are online, send instant messages, and talk online.
TCP/5050