#include "packet_io/active.h"
#include "ports/port_object.h"
#include "profiler/profiler_defs.h"
+#include "reputation/reputation_common.h"
#include "sfip/sf_ipvar.h"
#include "stream/stream.h"
#include "utils/stats.h"
pc.total_alert_pkts++;
-#if 0
- // FIXIT-RC DELETE THIS this should be a generic feature of otn
if ( otn->sigInfo.gid != GID_REPUTATION )
{
/* Don't include IP Reputation events in count */
pc.alert_pkts++;
}
-#endif
OutputSet* idx = head ? head->AlertList : nullptr;
EventManager::call_alerters(idx, p, otn->sigInfo.message.c_str(), event);
{ CountType::SUM, "trusted", "number of packets trusted" },
{ CountType::SUM, "monitored", "number of packets monitored" },
{ CountType::SUM, "memory_allocated", "total memory allocated" },
-{ CountType::SUM, "total_alerts", "total alerts triggered" },
{ CountType::END, nullptr, nullptr }
};
act->block_session(p, true);
act->set_drop_reason("reputation");
reputationstats.blocked++;
- reputationstats.total_alerts++;
if (PacketTracer::is_active())
PacketTracer::log("Reputation: packet blocked, drop\n");
}
DetectionEngine::queue_event(GID_REPUTATION, monitor_event);
reputationstats.monitored++;
- reputationstats.total_alerts++;
}
else if (TRUSTED_SRC == decision or TRUSTED_DST == decision)
DetectionEngine::queue_event(GID_REPUTATION, allowlist_event);
act->trust_session(p, true);
reputationstats.trusted++;
- reputationstats.total_alerts++;
}
}