{"id":22611,"date":"2023-01-06T08:21:24","date_gmt":"2023-01-06T08:21:24","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=22611"},"modified":"2026-04-17T18:07:42","modified_gmt":"2026-04-17T18:07:42","slug":"nips-v5-6r10-rule-types","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/nips-v5-6r10-rule-types\/","title":{"rendered":"NIPS V5.6R10 Rule Types"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>NIPS V5.6R10 has five types of rules to detect DDoS attacks, local privilege elevation, information gathering, suspicious network behaviors, and network monitoring events, respectively. They are described as follows.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"228\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-1024x228.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22612\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-1024x228.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-300x67.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-768x171.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-1536x342.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-600x133.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-200x44.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1.png 1907w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">1. Information gathering<\/h2>\n\n\n\n<p>Information gathering is the first step of network intrusion. Attackers use various methods to scan and probe target hosts and identify paths to discover vulnerabilities on target servers. NIPS rule database contains rules for detecting directory traversal, information leak vulnerability exploitation, port scan, and so on.<\/p>\n\n\n\n<p>Note that directory traversal vulnerability detection is strongly associated with web applications. If some web application signatures match IPS built-in vulnerability detection rules, legitimate traffic may trigger alerts. Handle alerts according to the actual situation.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/2.png\"><img decoding=\"async\" width=\"1727\" height=\"897\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/2-1024x532.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22614\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/2-1024x532.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/2-300x156.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/2-768x399.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/2-1536x798.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/2-600x312.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/2-200x104.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/2.png 1727w\" sizes=\"(max-width: 1727px) 100vw, 1727px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">2. Local privilege elevation<\/h2>\n\n\n\n<p>Attackers exploit the vulnerabilities on compromised hosts to start intrusion and obtain the server privilege for global control. NIPS rule database contains rules for detecting remote code execution, SQL injection, file inclusion, file upload, XSS, overflow attack, and other attacks.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/3.png\"><img decoding=\"async\" width=\"1024\" height=\"532\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/3-1024x532.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22616\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/3-1024x532.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/3-300x156.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/3-768x399.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/3-1536x797.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/3-600x311.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/3-200x104.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/3.png 1724w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">3. Suspicious network behavior<\/h2>\n\n\n\n<p>Generally, trojans or worms on compromised hosts perform suspicious network behaviors, such as malicious connections to external targets and cryptomining. NIPS rule database contains rules for detecting trojan communication, trojan file upload, worm, cryptomining, and other attacks. NIPS can detect HTTP\/SMTP file upload behaviors of trojans and worms.<\/p>\n\n\n\n<p>Note that suspicious network events are critical ones. If such events are alerted, trace back the source IP and check the server for a trojan infection.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"529\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/4-1024x529.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22618\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/4-1024x529.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/4-300x155.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/4-768x397.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/4-1536x793.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/4-600x310.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/4-200x103.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/4.png 1731w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">4. DDoS attacks<\/h2>\n\n\n\n<p>In a DDoS attack, attackers overflow the server with massive connection requests or exhaust the server&acirc;&euro;&trade;s resources or bandwidth to make it unresponsive to legitimate access.<\/p>\n\n\n\n<p>NIPS rule database contains rules for detecting flood, port scan, and DDoS vulnerability exploit of common components, such as buffer overflows and memory leaks.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"529\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/5-1024x529.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22620\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/5-1024x529.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/5-300x155.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/5-768x397.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/5-1536x794.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/5-600x310.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/5-200x103.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/5.png 1733w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>Notes: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>DDoS detection rules are controlled by the DoS module. You should enable the DoS module to make DDoS detection rules take effect.<\/li><\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"528\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/6-1024x528.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22622\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/6-1024x528.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/6-300x155.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/6-768x396.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/6-1536x792.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/6-600x310.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/6-200x103.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/6.png 1729w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\"><li>NIPS performs traffic limit on DDoS attack traffic instead of blocking it. Even if <strong>block<\/strong> is chosen in the rule template, you will find DDoS attack traffic is allowed to pass according to the logs.<\/li><li>Although port scan is used to collect information, this behavior is similar to a DDoS attack, and therefore, port scan detection is controlled by the DoS module.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">5. Network monitoring<\/h2>\n\n\n\n<p>Network monitoring alerts are used to notify customers of specific protocol packets in the customer network and whether they are legitimate. NIPS network monitoring rules can identify network events. However, a one-time event is not regarded as an attack. Network monitoring rules are those whose <strong>Technical<\/strong> <strong>Approaches<\/strong> in the rule description are set to <strong>Events<\/strong> <strong>Monitor<\/strong>. NIPS rule database contains rules for detecting FTP\/SMB\/Telnet login, web crawlers, weak password, ICMP detection, and so on.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"532\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/7-1024x532.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22624\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/7-1024x532.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/7-300x156.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/7-768x399.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/7-1536x798.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/7-600x312.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/7-200x104.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/7.png 1728w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div><\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>NIPS V5.6R10 has five types of rules to detect DDoS attacks, local privilege elevation, information gathering, suspicious network behaviors, and network monitoring events, respectively. They are described as follows. 1. Information gathering Information gathering is the first step of network intrusion. Attackers use various methods to scan and probe target hosts and identify paths to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35726,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[10],"tags":[487],"class_list":["post-22611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nips","tag-knowledge-base"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIPS V5.6R10 Rule Types - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIPS V5.6R10 Rule Types - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"NIPS V5.6R10 has five types of rules to detect DDoS attacks, local privilege elevation, information gathering, suspicious network behaviors, and network\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-06T08:21:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-1024x228-1.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"NIPS V5.6R10 Rule Types - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"NIPS V5.6R10 has five types of rules to detect DDoS attacks, local privilege elevation, information gathering, suspicious network behaviors, and network\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-1024x228-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nips-v5-6r10-rule-types\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nips-v5-6r10-rule-types\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"NIPS V5.6R10 Rule Types\",\"datePublished\":\"2023-01-06T08:21:24+00:00\",\"dateModified\":\"2026-04-17T18:07:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nips-v5-6r10-rule-types\\\/\"},\"wordCount\":458,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nips-v5-6r10-rule-types\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/1-1024x228-1.png\",\"keywords\":[\"knowledge base;\"],\"articleSection\":[\"NIPS\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/nips-v5-6r10-rule-types\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nips-v5-6r10-rule-types\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/nips-v5-6r10-rule-types\\\/\",\"name\":\"NIPS V5.6R10 Rule Types - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nips-v5-6r10-rule-types\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nips-v5-6r10-rule-types\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/1-1024x228-1.png\",\"datePublished\":\"2023-01-06T08:21:24+00:00\",\"dateModified\":\"2026-04-17T18:07:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nips-v5-6r10-rule-types\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/nips-v5-6r10-rule-types\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nips-v5-6r10-rule-types\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/1-1024x228-1.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/1-1024x228-1.png\",\"width\":1024,\"height\":228,\"caption\":\"Computer screen displaying software interface settings.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nips-v5-6r10-rule-types\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIPS V5.6R10 Rule Types\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIPS V5.6R10 Rule Types - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"NIPS V5.6R10 Rule Types - NSFOCUS","og_description":"NIPS V5.6R10 has five types of rules to detect DDoS attacks, local privilege elevation, information gathering, suspicious network behaviors, and network","og_url":"https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/","og_site_name":"NSFOCUS","article_published_time":"2023-01-06T08:21:24+00:00","article_modified_time":"2026-04-17T18:07:42+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-1024x228-1.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"NIPS V5.6R10 Rule Types - NSFOCUS","twitter_description":"NIPS V5.6R10 has five types of rules to detect DDoS attacks, local privilege elevation, information gathering, suspicious network behaviors, and network","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-1024x228-1.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"NIPS V5.6R10 Rule Types","datePublished":"2023-01-06T08:21:24+00:00","dateModified":"2026-04-17T18:07:42+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/"},"wordCount":458,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-1024x228-1.png","keywords":["knowledge base;"],"articleSection":["NIPS"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/","url":"https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/","name":"NIPS V5.6R10 Rule Types - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-1024x228-1.png","datePublished":"2023-01-06T08:21:24+00:00","dateModified":"2026-04-17T18:07:42+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-1024x228-1.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/1-1024x228-1.png","width":1024,"height":228,"caption":"Computer screen displaying software interface settings."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/nips-v5-6r10-rule-types\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"NIPS V5.6R10 Rule Types"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/22611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=22611"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/22611\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35726"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=22611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=22611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=22611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}