Skip to content

Commit 9589aa0

Browse files
committed
Add Sigma rule
1 parent aac17a5 commit 9589aa0

File tree

2 files changed

+30
-0
lines changed

2 files changed

+30
-0
lines changed

README.md

+1
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
- **Syntax-based detection**: Detects SQL injection attacks by parsing incoming queries and checking for suspicious syntax using `libinjection`
2121
- Prevents SQL injection attacks by blocking malicious queries from reaching the database server, and returning an error to the client instead
2222
- Logs an audit trail for detections containing the query and the prediction score
23+
- Sigma rule for detection in SIEM systems
2324
- Prometheus metrics for quantifying detections
2425
- Logging
2526
- Configurable via environment variables
+29
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
title: SQL injection detected
2+
description: Detects SQL injection attacks detected by the IDS/IPS plugin
3+
references:
4+
- http://www.sqlinjection.net/
5+
- https://attack.mitre.org/techniques/T1190/
6+
- https://owasp.org/Top10/A03_2021-Injection/
7+
- https://capec.mitre.org/data/definitions/66.html
8+
- https://cwe.mitre.org/data/definitions/89.html
9+
author: Mostafa Moradian <mostafa@gatewayd.io>
10+
date: 2024/05/19
11+
tags:
12+
- attack.initial_access
13+
- attack.t1190
14+
- owasp.a03
15+
- capec.66
16+
- cwe.89
17+
logsource:
18+
product: gatewayd
19+
service: gatewayd-plugin-sql-ids-ips
20+
detection:
21+
selection:
22+
detector: deep_learning_model
23+
score|gte: 0.8
24+
keywords:
25+
- "SQL injection detected"
26+
condition: selection and keywords
27+
falsepositives:
28+
- Certain queries like accessing database schema may trigger this alert
29+
level: high

0 commit comments

Comments
 (0)