Chapter 30 ADP
Protocol anomaly detection includes HTTP Inspection, TCP Decoder, UDP Decoder and ICMP Decoder where each category reflects the packet type inspected.
Protocol anomaly rules may be updated when you upload new firmware.
30.9.1 HTTP Inspection and TCP/UDP/ICMP DecodersThe following table gives some information on the HTTP inspection, TCP decoder, UDP decoder and ICMP decoder ZyWALL protocol anomaly rules.
Table 144 HTTP Inspection and TCP/UDP/ICMP Decoders
LABEL | DESCRIPTION |
HTTP Inspection |
|
|
|
This rule deals with | |
ATTACK | Apache uses this, so if you have an Apache server, you need to |
| enable this option. |
|
|
This rule can detect attacks where malicious attackers use ASCII- | |
| encoding to encode attack strings. Attackers may use this method |
| to bypass system parameter checks in order to get information or |
| privileges from a web server. |
|
|
Bare byte encoding uses | |
ENCODING ATTACK | decoding |
| |
| encoding allows the user to emulate an IIS server and interpret |
| |
|
|
This is a rule to decode | |
ATTACK | detect attacks where malicious attackers use |
| encode attack strings. Attackers may use this method to bypass |
| system parameter checks in order to get information or privileges |
| from a web server. |
|
|
This rule normalizes directory traversals and | |
ATTACK | directories. So, “/abc/this_is_not_a_real_dir/../xyz” get normalized |
| to “/abc/xyz”. Also, “/abc/./xyz” gets normalized to “/abc/xyz”. If a |
| user wants to configure an alert, then specify “yes”, otherwise “no”. |
| This alert may give false positives since some web sites refer to |
| files using directory traversals. |
|
|
This rule is IIS specific. IIS does two passes through the request | |
ATTACK | URI, doing decodes in each one. In the first pass, IIS encoding |
| |
| pass ASCII, bare byte, and %u encodings are done. |
|
|
This is an IIS emulation rule that normalizes backslashes to | |
ATTACK | slashes. Therefore, a |
| “/abc/xyz”. |
|
|
This rule can detect attacks which send attack strings containing | |
ATTACK | encoding references the unicode.map file. Attackers may use this |
| method to bypass system parameter checks in order to get |
| information or privileges from a web server. |
|
|
This rule normalizes multiple slashes in a row, so something like: | |
ATTACK | “abc/////////xyz” get normalized to “abc/xyz”. |
|
|
This rule lets you receive a log or alert if certain | |
ATTACK | characters are used in a request URI. For instance, you may want |
| to know if there are NULL bytes in the |
|
|
| 457 |
ZyWALL USG 300 User’s Guide | |
|
|