cscli scenarios install crowdsecurity/http-dos-random-uri
This scenario detects DoS tools that issue a high number of requests, while varying the suffix URL to evade static rules.
Directly inspired by some specific DoS tools TTP.
⚠️ This scenario might trigger false positives, proper testing is advised ⚠️
1type: leaky2format: 2.03#debug: true4name: crowdsecurity/http-dos-random-uri5description: "Detect DoS tools using random uri"6#pattern seen in loic tool7filter: |8 evt.Meta.log_type == "http_access-log" &&9 evt.Meta.http_verb == 'GET' &&10 evt.Parsed.static_ressource == 'false' &&11 Upper(evt.Parsed.file_frag) == evt.Parsed.file_frag &&12 len(evt.Parsed.file_frag) == 6 &&13 int(evt.Meta.http_args_len) == 014capacity: 3015leakspeed: 1s16groupby: "evt.Meta.source_ip"17blackhole: 2m18labels:19 confidence: 220 spoofable: 021 classification:22 - attack.T149823 behavior: "http:dos"24 label: "HTTP DOS via random URI"25 service: http26 remediation: true27