Learn how to analyze the auditing data for intrusion detection activities, and obtain reference information about the fields in the IM audit record.
Display Journal Entry Object . . . . . . .: Library . . . . . .: Member . . . . . . .: Incomplete data . .: No Minimized entry data: *NONE Sequence . . . . . .: 5 Code . . . . . . . .: T - Audit trail entry Type . . . . . . . .: IM - Intrusion detection monitor Entry specific data Column *...+....1....+....2....+....3....+4....+....5. 00001 'P2005-06-06-15.01.32.6482729999 000009.10.11.0 ' 00051 ' 000009.10.11.255' 00101 ' , ATTACK RESTP' 00151 'ROT
Field Type | Format | Description | Sample Entry |
---|---|---|---|
Entry type | Char(1) | Potential intrusion event detected. | P |
Time of event | TIMESTAMP | Timestamp of when the event was detected. | 2005-06-06-15.01.32.648272 |
Detection point identifier | Char(4) | Unique identifier for the processing location that detected the intrusion event. This field is for use by service personnel. | 9999 |
Local address family | Char(1) | Local IP address family associated with the detected event. | This field is hidden and appears blank. Press F11 to display the information. |
Local port number | Zoned(5,0) | Local port number associated with the detected event. (A value of 00000 represents an intrusion on any port because there is no port 0.) | 00000 |
Local IP address | Char(46) | Local IP address associated with the detected event. | 9.10.11.0 |
Remote address family | Char(1) | Remote address family associated with the detected event. | This field is hidden and appears blank. Press F11 to display the information. |
Remote port number | Zoned(5,0) | Remote port number associated with the detected event. | 00000 |
Remote IP address | Char(46) | Remote IP address associated with the detected event. | 9.10.11.255 |
Probe type identifier | Char(6) | Identifies the type of probe used to detect the potential
intrusion. Possible values include:
|
ATTACK |
Event correlator | Char(4) | Unique identifier for this specific intrusion event. You can use this identifier to correlate this audit record with other intrusion detection information. | This field is hidden and appears blank. Press F11 to display the information. |
Event type | Char(8) | Identifies the type of potential intrusion that was
detected. The possible values include:
|
RESTP |
Suspected packet | Char(1002) | This variable-length, binary field might contain up to the first 1000 bytes of the IP packet that is associated with the detected event. The first two bytes of this field contain the length of the suspected packet information. | This field is hidden and appears blank. Press F11 to display the information. |