Anomaly detection for wildfly
Detecting suspicious log events which lead to potential security threats
Sigma rule (View on GitHub)
1title: Anomaly detection for wildfly
2id: 082c6be1-cb74-4957-90e3-7fcf398dd6ff
3status: experimental
4description: Detecting suspicious log events which lead to potential security threats
5author: Loginsoft Research Unit
6references:
7 - Internal Research
8date: 2020/08/12
9logsource:
10 product: wildfly
11 category: webserver
12detection:
13 keywords:
14 - 'Error unmarshaling'
15 - 'Error marshaling'
16 condition: keywords
17falsepositives:
18 - Unknown
19level: critical```