-
Notifications
You must be signed in to change notification settings - Fork 89
Improve CTI Taxonomy documentation #685
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from all commits
Commits
Show all changes
3 commits
Select commit
Hold shift + click to select a range
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,40 @@ | ||
| --- | ||
| id: benign | ||
| title: Benign Classifications | ||
| sidebar_position: 7 | ||
| --- | ||
|
|
||
| import TableRender from "@site/src/components/tableRender" | ||
| import GithubIconRender from "@site/src/components/githubIconRender" | ||
|
|
||
| export const classificationsURL = | ||
| "https://hub-cdn.crowdsec.net/master/taxonomy/classifications.json" | ||
| export const columns = [ | ||
| { | ||
| header: "Name", | ||
| accessorKey: "name", | ||
| }, | ||
| { | ||
| header: "Description", | ||
| accessorKey: "description", | ||
| }, | ||
| ] | ||
| export const include = ["scanner:"] | ||
|
|
||
| <GithubIconRender url={classificationsURL}></GithubIconRender> | ||
|
|
||
| IPs in this category may raise alerts, but they are not inherently dangerous. These IPs often belong to organizations that perform legitimate activities, such as internet-wide scanning or security research. | ||
|
|
||
| IPs belonging to those categories will have the `benign` [reputation](/u/cti_api/taxonomy/cti_object#reputation). | ||
|
|
||
| :::note | ||
|
|
||
| Blocking these IPs may not be necessary unless their behavior directly impacts your operations. | ||
|
|
||
| ::: | ||
|
|
||
| <TableRender | ||
| columns={columns} | ||
| url={classificationsURL} | ||
| include={include} | ||
| ></TableRender> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,23 +1,33 @@ | ||
| --- | ||
| id: scores | ||
| title: CTI Scores | ||
| title: Scores | ||
| sidebar_position: 3 | ||
| --- | ||
|
|
||
| ## Understanding CrowdSec CTI Scores | ||
|
|
||
| While CrowdSec provides general scores for common use cases, this section offers a deeper breakdown of IP-related data. | ||
|
|
||
| While CrowdSec already provides ready-made scores for common usecases such as background noise score, the scores in this section offer a more in-depth breakdown of the information we have collected about an IP. They can be used both to help categorize alerts and to build internal products for your organizations needs. These scores are indicators of malevolence associated with an IP address, computed over several periods of time : 1 day, 1 week, 1 month and overall. | ||
|
|
||
| For a given period, each indicator is provided with a value ranging from **0** (lowest value) to **5** (highest value). The following table describes the indicators in more detail. | ||
| These scores help categorize alerts and can be used to build internal products tailored to your organization's needs. | ||
|
|
||
| | indicator | explaination | | ||
| |-----------|--------------| | ||
| |Aggressiveness | _What is the intensity of the attack?_ <br /> This component measures the number of attacks reported over a period of time. | | ||
| |Threat | _How dangerous are the attacks?_ <br /> This component measures how dangerous an IP is based on the type of attacks we usually see it attempt. An IP known for crawling and scanning will have a lower threat level than an IP reported for brute-force and exploits. This score ranges from 1 (mainly crawling) to 5 (exploit). 0 is the default for unknown scenarios | | ||
| |Trust| _What is the level of confidence in the actors which reported the IP address?_ <br /> This component measures the degree of trust we have in the reports that we received about this IP. It is based on the reputation (age, number of reports) and the diversity (number of IP ranges, AS Numbers) of all security engines reporting the IP. | | ||
| | Anomaly | _Are there any red flags associated with the device behind this IP address?_ <br /> This score is based on static properties of the machine behind the IP. For instance a machine exposing old and vulnerable software will have a high anomaly score. | | ||
| | Total | Aggregation of the 4 components above. | | ||
| They serve as indicators of malevolent activity associated with an IP address, computed over several periods: 1 day, 1 week, 1 month, and overall. | ||
|
|
||
| For a more in-depth explanation on how we compute these scores, refer to our [blog article](https://www.crowdsec.net/blog/crowdsec-cti-scoring-system). | ||
| Each score is measured on a scale from **0** (lowest) to **5** (highest). Below is an overview of the main score components: | ||
|
|
||
| The `ip_range_score` is the score of malevolence associated with an IP range, ranging from *0* (No IP reported) to *5* (massively reported). It is calculated based on the number of IPs belonging to this range that were reported by the community as malicious | ||
| | Indicator | Explanation | | ||
| | ------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | | ||
| | **Aggressiveness** | _How intense is the attack?_ <br /> Measures the frequency of attacks within a given time period. A higher score indicates a greater number of attack attempts, signaling aggressive behavior or persistent targeting over time. | | ||
| | **Threat** | _How dangerous are the attacks?_ <br /> Reflects the severity of the attacks, ranging from low-risk activities like scanning to high-risk behaviors like exploiting vulnerabilities. A higher score means the IP is associated with more dangerous tactics. | | ||
| | **Trust** | _How reliable is the information about the IP?_ <br /> Based on the credibility of the reporting sources. This score considers factors like the age of the reports, how many different security engines flagged the IP, and the diversity of the reports. A higher score indicates more trust in the accuracy and reliability of the data. | | ||
| | **Anomaly** | _Are there any suspicious behaviors associated with the device behind this IP?_ <br /> Evaluates red flags like outdated software, unusual configurations, or other traits that could indicate a compromised or malicious device. A higher score suggests more alarming anomalies linked to the IP. | | ||
| | **Total** | Combines the scores of the above four components to give an overall malevolence score. The higher the total, the more likely the IP is associated with malicious activity indicators. | | ||
|
|
||
| For a more detailed explanation on how we calculate these scores, read our [blog article](https://www.crowdsec.net/blog/crowdsec-cti-scoring-system). | ||
|
|
||
| ### IP Range Score | ||
|
|
||
| The `ip_range_score` reflects the malevolence of an entire IP range, ranging from _0_ (no reports) to _5_ (highly reported). | ||
|
|
||
| It is based on the number of IPs in the range that have been flagged as malicious by the CrowdSec community. | ||
|
|
||
| The more IPs from the same range are reported, the higher the score, indicating a greater likelihood that the range is associated with malicious activity. |
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we tell a bit more about our process of qualifying an IP as SAFE ?
Say that we have a list of genuine know crawlers exposing their IPs and ranges and that we take those in account to qualify an IP as SAFE.
Safe also means that it has no malicious intent, not that it isn't triggering certain scenarios, mainly crawling scenarios