High DNS Requests Rate
High DNS requests amount from host per short period of time
Sigma rule (View on GitHub)
1title: High DNS Requests Rate
2id: b4163085-4001-46a3-a79a-55d8bbbc7a3a
3status: unsupported
4description: High DNS requests amount from host per short period of time
5author: Daniil Yugoslavskiy, oscd.community
6date: 2019/10/24
7modified: 2023/03/24
8tags:
9 - attack.exfiltration
10 - attack.t1048.003
11 - attack.command_and_control
12 - attack.t1071.004
13logsource:
14 category: dns
15detection:
16 selection:
17 query: '*'
18 timeframe: 1m
19 condition: selection | count() by src_ip > 1000
20falsepositives:
21 - Legitimate high DNS requests rate to domain name which should be added to whitelist
22level: medium
Related rules
- High DNS Requests Rate - Firewall
- High NULL Records Requests Rate
- High TXT Records Requests Rate
- Possible DNS Tunneling
- DNSCat2 Powershell Implementation Detection Via Process Creation