V 2.0 : MAC Spoofing Attack
Vendor Documentation
Classification
Rule Name | Rule Type | Classification | Common Event |
V 2.0 : MAC Spoofing Attack | Base Rule | General Information Log Message | Information |
Mapping with LogRhythm Schema
Device Key in Log Message | LogRhythm Schema | Data Type | Schema Description |
N/A | N/A | N/A | flow start time |
N/A | N/A | N/A | flow stop time |
N/A | <object> | Text/String | device |
N/A | <vendorinfo> | Text/String | event type |
type | <action> | Text/String | description |
vap | N/A | N/A | N/A |
bssid | <session> | Text/String | N/A |
src | <smac> | Text/String | N/A |
dst | <dmac> | Text/String | N/A |
radio | N/A | N/A | N/A |
band | N/A | N/A | N/A |
channel | N/A | N/A | N/A |
rssi | N/A | N/A | N/A |
fc_type | N/A | N/A | N/A |
fc_subtype | N/A | N/A | N/A |