Files
zira-etc/crowdsec/hub/scenarios/crowdsecurity/http-crawl-non_statics.yaml

22 lines
677 B
YAML

type: leaky
name: crowdsecurity/http-crawl-non_statics
description: "Detect aggressive crawl from single ip"
filter: "evt.Meta.log_type in ['http_access-log', 'http_error-log'] && evt.Parsed.static_ressource == 'false' && evt.Parsed.verb in ['GET', 'HEAD']"
distinct: "evt.Parsed.file_name"
leakspeed: 0.5s
capacity: 40
#debug: true
#this limits the memory cache (and event_sequences in output) to five events
cache_size: 5
groupby: "evt.Meta.source_ip + '/' + evt.Parsed.target_fqdn"
blackhole: 1m
labels:
confidence: 1
spoofable: 0
classification:
- attack.T1595
behavior: "http:crawl"
service: http
label: "detection of aggressive crawl"
remediation: true