Karl Levitt (KL), Steven Templeton (ST), Jeff Rowe (JR), Steven Cheung (SC), Aaron Stearns (AS), Rick Crawford (RC), Marcus Tylutki, and David O'Brien


Concept telnet_connect_local
End.
Concept host_port_scan_simple # vertical scan from 1 host
For-all PC source = host 2
| PC.target_ports | is "high"
End.
Concept port_connect
Assert port_connect.port = PCR.port
Assert port_connect.prot = PCR.protocol
End.
Concept TCP_port.connect
End.
Concept conection_spoof_prelude
Sensor SEQ NUM Probe
DOS.active while seqnumProbe.active
DOS.active while spoofedPacketSend.active
SPS.src-host == DOS.tartget_host #apparent sender
Allows read with_capabilities of DOS.targetuser
End.
Concept syn_flood
DOS.target.port ß SFD.dst.port
DOS.active ß [SFD.time1, SFO.time2]
End
Concept unplugged_cable
Has_effect
DOS.target.port ß *
DOS.active ß [UCD.time1, UCD.time2]
Concept linux5.1i386-IMAP-known-vulnerable
portscan-port includes IMAP\143
TOPM.host[portscan.host],is = linux5.1
TOPM.host[PS.host].arch=i386
SA.service[PS.host] includes IMAP
End.
Concept