https://github.com/tilfin/detect-http-attack
Detecting attack tool for HTTP server such as Apache and Nginx.
https://github.com/tilfin/detect-http-attack
attack-detection http-logs nginx-log ruby
Last synced: 2 months ago
JSON representation
Detecting attack tool for HTTP server such as Apache and Nginx.
- Host: GitHub
- URL: https://github.com/tilfin/detect-http-attack
- Owner: tilfin
- Created: 2013-02-08T14:20:08.000Z (over 12 years ago)
- Default Branch: master
- Last Pushed: 2013-12-22T12:35:57.000Z (over 11 years ago)
- Last Synced: 2025-02-26T05:41:32.881Z (5 months ago)
- Topics: attack-detection, http-logs, nginx-log, ruby
- Language: Ruby
- Homepage:
- Size: 215 KB
- Stars: 11
- Watchers: 5
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
Detect HTTP attack
==================
[](https://travis-ci.org/tilfin/detect-http-attack) [](https://coveralls.io/r/tilfin/detect-http-attack?branch=master)It is a detecting attack tool for HTTP server such as Apache and Nginx.
Analyzing access logs, output formated text as results.To use shell pipelines easily, all I/O targets are STDIN, STDOUT and STDERR.
Prerequisites
-------------
Ruby 1.9.xInstallation
------------$ git clone https://github.com/tilfin/detect-http-attack.git
$ cd detect-http-attackQuick Start
-----------### Analyze access log:
$ ./detect-http-attack.rb < /var/log/nginx/access.log
Targets eight or more consecutive senquential access:
$ ./detect-http-attack.rb -s 8 < /var/log/apache/access_log
Regarded as senquential access within 3 seconds:
$ ./detect-http-attack.rb -i 3 < /var/log/apache/access_log
### Notify attack while tailing access log:
Notifying attacks whenever detecting them to STDERR, all results are output to a file.
$ tail -f /var/log/nginx/access.log | ./detect-http-attack.rb -n > attack.log
### Supports LTSV Format:
Handle logs of Labeled Tab-separated Values (LTSV) format (http://ltsv.org/)
$ ./detect-http-attack.rb -ltsv < /var/log/apache/access_ltsv_log
### Settings and Customize output template:
Edit the default configuration file (detect_http_attack.conf) or specify another file.
$ ./detect-http-attack.rb -f another.conf < access_log
Refer detect_http_attack.conf about the detail of template setting.
### Usage:
$ ./detect-http-attack.rb --help
Usage: detect_http_attack [options]
-ltsv Log type is LTSV
-n notify when detecting attack
-s COUNT Specify minimum sequential count
-i SECONDS Specify maximum interval seconds
-f CONFFILE Specify configuration fileExample
-------Detected attack result.
$ ./detect_http_attack.rb < /var/log/nginx/access.log
10.128.192.255 15 Mozilla/3.0 (windows)
2012-12-20T08:25:28+09:00 200 /admin/phpmyadmin/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /wp-content/plugins/wp-phpmyadmin/phpmyadmin/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /mysql/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /phpmyadmin2/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /pma/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /phpmyadmin/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /myadmin/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /phpMyAdmin/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /admin/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /wordpress/wp-content/plugins/wp-phpmyadmin/phpmyadmin/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /blog/wp-content/plugins/wp-phpmyadmin/phpmyadmin/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /sql/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /blog/phpMyAdmin/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /wp/wp-content/plugins/wp-phpmyadmin/phpmyadmin/scripts/setup.php -
2012-12-20T08:25:28+09:00 200 /scripts/setup.php -Settings
--------### Excludes
Excludes monitaring targets
#### Host
exc_hosts=127.0.0.1,localhostIt is a comma separated list of hosts.
#### User-Agent
exc_ua_match=bot|googleIt is a regular expression with ignored case.
#### Path
exc_path_match=\.(html|js|css|jpg|gif|png|ico)$It is a regular expression.
### Output Format
#### DateTime
date_format=%Y-%m-%dT%H:%M:%S