#[non_exhaustive]
pub enum IntrusionCategory {
Show 30 variants XSS, SQL_INJECTION, PATH_TRANSVERSAL, WEB_ATTACK, DOS, SURVEILLANCE, TROJAN, VIRUS, SPYWARE, RAT_TOOL, RANSOMWARE, HACKTOOL, PROXY_AVOIDANCE, REMOTE_EXPLOIT, LOCAL_EXPLOIT, BOTNET, SPAM, PHISHING, CEO_FRAUD, SCAM, DATA_THEFT, BRUTE_FORCE, MISCONFIGURATION, AD_ATTACK, UNKNOWN, INFORMATION_LEAKAGE, ANOMALY, SESSION_FIXATION, PROTOCOL_ATTACK, REPUTATION,
}

Variants (Non-exhaustive)

This enum is marked as non-exhaustive
Non-exhaustive enums could have additional variants added in future. Therefore, when matching against variants of non-exhaustive enums, an extra wildcard arm must be added to account for any future variants.

XSS

Cross site scripting

SQL_INJECTION

SQL Injection

PATH_TRANSVERSAL

Path Transversal attack

WEB_ATTACK

Common web attacks

DOS

Denial of service

SURVEILLANCE

Scan or Surveillance

TROJAN

Trojan horse

VIRUS

Simple virus

SPYWARE

Spyware

RAT_TOOL

Remote administration tools

RANSOMWARE

Ransomware attacks

HACKTOOL

Hacktools like mimikatz

PROXY_AVOIDANCE

TOR or Web proxies

REMOTE_EXPLOIT

Remote execution exploit

LOCAL_EXPLOIT

Local execution exploit

BOTNET

Botnet related

SPAM

Spam

PHISHING

Phising

CEO_FRAUD

Email scam

SCAM

Email scam

DATA_THEFT

Exfiltration of information

BRUTE_FORCE

Brute force: Password/users guessing

MISCONFIGURATION

Clear text passwords…

AD_ATTACK

Active Directory attack: kerberoasting, DC Sync, Golden Ticket, Pass the Hash, Pass the ticket…

UNKNOWN

INFORMATION_LEAKAGE

Information Leakage involves the exposure of information that would facilitate attacks on the application or other infrastructure, such as insight into the application design, deployment, or organizational details.

ANOMALY

Anormal behaviour

SESSION_FIXATION

Session Fixation is an attack technique that forces a user’s session ID to an explicit value.

PROTOCOL_ATTACK

Protocol violations: HTTP Response Splitting, HTTP Request Smuggling, HTTP Header Injection

REPUTATION

IP, COUNTRY, DOMAIN in a suspicious or block list

Trait Implementations

Returns a copy of the value. Read more
Performs copy-assignment from source. Read more
Formats the value using the given formatter. Read more
Formats the value using the given formatter. Read more
This method tests for self and other values to be equal, and is used by ==. Read more
This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason. Read more
Serialize this value into the given Serde serializer. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more
Immutably borrows from an owned value. Read more
Mutably borrows from an owned value. Read more

Returns the argument unchanged.

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

The resulting type after obtaining ownership.
Creates owned data from borrowed data, usually by cloning. Read more
Uses borrowed data to replace owned data, usually by cloning. Read more
Converts the given value to a String. Read more
The type returned in the event of a conversion error.
Performs the conversion.
The type returned in the event of a conversion error.
Performs the conversion.