Enum usiem::events::intrusion::IntrusionCategory[][src]

#[non_exhaustive]
pub enum IntrusionCategory {
Show 30 variants XSS, SQL_INJECTION, PATH_TRANSVERSAL, WEB_ATTACK, DOS, SURVEILLANCE, TROJAN, VIRUS, SPYWARE, RAT_TOOL, RANSOMWARE, HACKTOOL, PROXY_AVOIDANCE, REMOTE_EXPLOIT, LOCAL_EXPLOIT, BOTNET, SPAM, PHISHING, CEO_FRAUD, SCAM, DATA_THEFT, BRUTE_FORCE, MISCONFIGURATION, AD_ATTACK, UNKNOWN, INFORMATION_LEAKAGE, ANOMALY, SESSION_FIXATION, PROTOCOL_ATTACK, REPUTATION,
}

Variants (Non-exhaustive)

This enum is marked as non-exhaustive
Non-exhaustive enums could have additional variants added in future. Therefore, when matching against variants of non-exhaustive enums, an extra wildcard arm must be added to account for any future variants.
XSS

Cross site scripting

SQL_INJECTION

SQL Injection

PATH_TRANSVERSAL

Path Transversal attack

WEB_ATTACK

Common web attacks

DOS

Denial of service

SURVEILLANCE

Scan or Surveillance

TROJAN

Trojan horse

VIRUS

Simple virus

SPYWARE

Spyware

RAT_TOOL

Remote administration tools

RANSOMWARE

Ransomware attacks

HACKTOOL

Hacktools like mimikatz

PROXY_AVOIDANCE

TOR or Web proxies

REMOTE_EXPLOIT

Remote execution exploit

LOCAL_EXPLOIT

Local execution exploit

BOTNET

Botnet related

SPAM

Spam

PHISHING

Phising

CEO_FRAUD

Email scam

SCAM

Email scam

DATA_THEFT

Exfiltration of information

BRUTE_FORCE

Brute force: Password/users guessing

MISCONFIGURATION

Clear text passwords…

AD_ATTACK

Active Directory attack: kerberoasting, DC Sync, Golden Ticket, Pass the Hash, Pass the ticket…

UNKNOWN
INFORMATION_LEAKAGE

Information Leakage involves the exposure of information that would facilitate attacks on the application or other infrastructure, such as insight into the application design, deployment, or organizational details.

ANOMALY

Anormal behaviour

SESSION_FIXATION

Session Fixation is an attack technique that forces a user’s session ID to an explicit value.

PROTOCOL_ATTACK

Protocol violations: HTTP Response Splitting, HTTP Request Smuggling, HTTP Header Injection

REPUTATION

IP, COUNTRY, DOMAIN in a suspicious or block list

Trait Implementations

Returns a copy of the value. Read more

Performs copy-assignment from source. Read more

Formats the value using the given formatter. Read more

Formats the value using the given formatter. Read more

This method tests for self and other values to be equal, and is used by ==. Read more

This method tests for !=.

Serialize this value into the given Serde serializer. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

Performs the conversion.

Performs the conversion.

The resulting type after obtaining ownership.

Creates owned data from borrowed data, usually by cloning. Read more

🔬 This is a nightly-only experimental API. (toowned_clone_into)

recently added

Uses borrowed data to replace owned data, usually by cloning. Read more

Converts the given value to a String. Read more

The type returned in the event of a conversion error.

Performs the conversion.

The type returned in the event of a conversion error.

Performs the conversion.