F5BigIpsPolicy Attack SignaturesΒΆ

The F5BigIpsPolicy Custom Resource (CR) supports the following attack signatures:

  • dns_blacklist_dns_reverse_lookup_response_for_known_malware_domain_spheral_ru_win_trojan_glupteba
  • dns_nginx_dns_resolver_dos
  • dns_dns_query_amplification_attempt
  • dns_malformed_dns_query_with_http_content
  • dns_named_authors_attempt
  • dns_named_authors_attempt_1
  • dns_named_version_attempt
  • dns_named_version_attempt_1
  • dns_os_linux_os_linux_x86_linux_overflow_attempt
  • dns_os_linux_os_linux_x86_linux_overflow_attempt_1
  • dns_os_linux_os_linux_x86_linux_overflow_attempt_admv2
  • dns_os_other_os_other_x86_freebsd_overflow_attempt
  • dns_os_solaris_exploit_sparc_overflow_attempt
  • powerdns_authoritative_server_denial_of_service
  • dns_server_other_bind_buffer_overflow_named_tsig_overflow_attempt
  • dns_server_other_bind_buffer_overflow_named_tsig_overflow_attempt_1
  • dns_server_other_bind_buffer_overflow_via_nxt_records
  • dns_server_other_bind_buffer_overflow_via_nxt_records_named_overflow_adm
  • dns_server_other_bind_buffer_overflow_via_nxt_records_named_overflow_admrocks
  • dns_server_other_bind_named_overflow_attempt
  • dns_spoof_query_response_ptr_with_ttl_of_1_min_and_no_authority
  • dns_spoof_query_response_with_ttl_of_1_min_and_no_authority
  • dns_tcp_inverse_query