Files
zira-etc/crowdsec/hub/scenarios/crowdsecurity/nginx-req-limit-exceeded.yaml

19 lines
439 B
YAML

type: leaky
#debug: true
name: crowdsecurity/nginx-req-limit-exceeded
description: "Detects IPs which violate nginx's user set request limit."
filter: evt.Meta.sub_type == 'req_limit_exceeded'
leakspeed: "60s"
capacity: 5
groupby: evt.Meta.source_ip
blackhole: 5m
labels:
remediation: true
confidence: 2
spoofable: 2
classification:
- attack.T1498
behavior: "http:dos"
label: "Nginx request limit exceeded"
service: http