2018-11-09 10:01:25 +01:00
|
|
|
Maltrail is a malicious traffic detection system, utilizing publicly
|
|
|
|
available (black)lists containing malicious and/or generally suspicious
|
|
|
|
trails, along with static trails compiled from various AV reports and
|
|
|
|
custom user defined lists, where trail can be anything from domain name
|
2019-03-15 09:47:18 +01:00
|
|
|
(e.g. zvpprsensinaix.com for Banjori malware),
|
2018-11-09 10:01:25 +01:00
|
|
|
URL (e.g. http://109.162.38.120/harsh02.exe for known malicious executable),
|
|
|
|
IP address (e.g. 185.130.5.231 for known attacker) or HTTP User-Agent header
|
|
|
|
value (e.g. sqlmap for automatic SQL injection and database takeover tool).
|
2019-03-15 09:47:18 +01:00
|
|
|
Also, it uses (optional) advanced heuristic mechanisms that can help in
|
2018-11-09 10:01:25 +01:00
|
|
|
discovery of unknown threats (e.g. new malware).
|