Anomaly detection for wildfly

Detecting suspicious log events which lead to potential security threats

Sigma rule (View on GitHub)

 1title: Anomaly detection for wildfly
 2id: 082c6be1-cb74-4957-90e3-7fcf398dd6ff
 3status: experimental
 4description: Detecting suspicious log events which lead to potential security threats
 5author: Loginsoft Research Unit
 6references:
 7    - Internal Research
 8date: 2020/08/12
 9logsource:
10  product: wildfly
11  category: webserver
12detection:
13    keywords:
14      - 'Error unmarshaling'
15      - 'Error marshaling'
16    condition: keywords
17falsepositives:
18  - Unknown
19level: critical```

References

to-top