4.12.1 irpaad.analyze_for_attacks #
- Possible values:
0 (All methods), 1 (SSH Flood), 2 (DNS Amplification), 3 (NTP Amplificatio4 (UDP Flood), 5 (Smurf), 6 (SYN Flood), 7 (ACK Flood), 8 (HTTP Flood) - Default value:
0
4.12.2 irpaad.enabled #
- Possible values:
0 (Disabled), 1 (Enabled) - Default value:
0
4.12.3 irpaad.log #
- Default value:
/var/log/irp/irpaad.log
4.12.4 irpaad.log.level #
- Possible values:
crit, error, warn, info, debug, trace - Default value:
info - Recommended value:
info
4.12.5 irpaad.mode #
Anomaly Detection modes:
– Automated threat mitigation actions are performed automatically when an attack gets detected.
- Possible values:
0 (Moderated), 1 (Automated) - Default value:
0
4.12.6 irpaad.reaction #
- Possible values:
0 (Flowspec Drop), 1 (Flowspec Redirect), 2 (Blackhole Drop), 3 (Blackhole Redirect) - Default value:
0
4.12.7 irpaad.sensitivity #
Decreasing the sensitivity threshold makes the algorithm less strict in flagging anomalies.
- Possible values:
45-90 - Default value:
70
4.12.8 irpaad.time.keep #
- Possible values:
1-4320 - Default value:
10






