Skip to main content
Skip table of contents

Security Classifications

The following tables provide Security classification information. This table lists descriptions and examples.

ClassificationDescriptionExamples Of
CompromiseLogs reporting on a successful system or network compromise.   

** Seen more on Host Intrusion Detection Systems (HIDS) than network based detection mechanisms. **
  • Admin privileges gained
  • Unauthorized data access
  • Seizing control of the logical flow of program execution
  • Modification of any critical file.
    Creation of unauthorized processes.
  • Modification a system configuration via use of an exploit.
AttackLogs reporting on activity indicative of a system or network attack where it is either assumed to have been successful or cannot be assumed to have failed.  Attack is known to have originated from a “Bad Guy” source.
  • Buffer overflow
  • SQL Injection attack
  • Forceful Browsing
  • Session Hijacking
  • Password Guessing (Dictionary)
  • Known Exploits
Denial of ServiceLogs reporting on activity indicative a denial of service where it is assumed to have succeeded or cannot be assumed to have failed.
  • DOS Attack
  • Distributed DOS Attack
  • Resource Starvation
  • Spinning (process starving CPU)
  • SynFlood Attack
  • Ping of Death
  • Win Nuke
  • Spam Flooding
  • Teardrop
MalwareLogs reporting on activity indicative of malware installation, propagation, or use.

This classification is set to RR=9 because malware is indicative of complex control of systems within the environment possibly leading to data loss with malicious intent, theft, tampering, etc.
  • Trojan horse installed
  • Backdoor traffic observed
  • Worm propagated
  • Virus activity observed
  • Spyware software installed
SuspiciousLogs reporting on activity that is suspicious but not known to be an attack or unauthorized.
  • Multiple failed login attempts (5 – 10 times)
  • Packets with abnormal payloads
  • Use of default user accounts (root, administrator, guest) detected by an ids and not an audit log.
  • Access from outside anticipated use zone(s).
ReconnaissanceLogs reporting on activity indicative of or directly indicating system or network reconnaissance.
  • Port Scan
  • Port Probe
  • Service enumeration
  • Program enumeration
  • User list enumeration
  • Directory enumeration
  • Web crawling
MisuseLogs reporting on activity indicative of system or network misuse.
  • Public webmail usage
  • Pornographic content observed
  • Unauthorized program access
  • Content policy violation
  • P2P Usage
ActivityLogs reporting on general system or network activity.
  • Packet type observed
  • Packet payload dump
  • Interface set in promiscuous mode
  • Attack Response
  • Forensic related activity
Failed AttackLogs reporting on attack activity that was not successful, possibly due to preventative measures.
  • Buffer overflow dropped
  • SQL Injection dropped
Failed Denial of ServiceLogs reporting on denial of service activity that was not successful, possibly due to preventative measures.
  • DOS attack prevented
  • Distributed DOS attack prevented
Failed MalwareLogs reporting on malware activity that was not successful, possibly due to preventative measures.
  • Trojan horse installation detected and dropped
  • Worm propagation blocked
Failed SuspiciousLogs reporting on suspicious activity that was not successful, possibly due to preventative measures.
  • Packet with abnormal payload dropped
  • Hotmail usage blocked
  • Pornographic content blocked
  • Unauthorized program access denied
Failed ActivityLogs reporting on general system or network activity that was not successful, possibly due to preventative measures
  • Drop Peer to Peer
  • FTP Command Denied
Other SecurityLogs reporting on security activity not otherwise classifiable 

Security Classification Defaults

This table gives defaults for Risk Rating (RR), Event Forwarding, and LogMart Forwarding.

ClassificationDefault Risk Rating (RR)*Default Event
Forwarding**
Default LogMart
Forwarding
Compromise9Forward AllForward All
Attack8Forward AllForward All
Denial of Service8Forward AllForward All
Malware9Forward AllForward All
Suspicious6Forward AllForward All
Reconnaissance4Forward AllForward All
Misuse5Forward AllForward All
Activity0Forward IfForward Events
Failed Attack0Forward NoneForward All
Failed Denial of Service0Forward NoneForward All
Failed Malware0Forward NoneForward All
Failed Suspicious0Forward NoneForward All
Failed Activity0Forward NoneForward None
Other Security0Case by CaseForward Events

*This is the usual Risk Rating assigned to a Common Event associated with this classification.  However, Risk Ratings will vary by Common Event within the same classification.  This value is a general default, not strictly enforced.

**This is the default setting for forwarding the log to the Platform Manager assigned to a Common Event associated with this classification.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.