Research Article

CCgen: Injecting Covert Channels into Network Traffic

Table 2

Suricata rulesets used for the evaluation.

nameSummaryVendor

et/openEmerging threats open rulesetProofpoint
et/proEmerging threats pro rulesetProofpoint
Oisf/trafficidSuricata traffic ID rulesetOISF
Ptresearch/attackdetectionPositive technologies attack detection team rulesetPositive technologies
Scwx/enhancedSecureworks suricata-enhanced rulesetSecureworks
Scwx/malwareSecureworks suricata-malware rulesetSecureworks
Scwx/securitySecureworks suricata-security rulesetSecureworks
Sslbl/ssl-fp-blacklistAbuse.ch SSL blacklistAbuse.ch
Sslbl/ja3-fingerprintsAbuse.ch suricata JA3 fingerprint rulesetAbuse.ch
Etnetera/aggressiveEtnetera aggressive IP blacklistEtnetera a.s.
tgreen/huntingThreat hunting rulestgreen
Malsilo/win-malwareCommodity malware rulesMalsilo