[hobbit] Hobbit DDOS Attack Detection (submission)
Josh Luthman
josh at imaginenetworksllc.com
Fri Jan 25 22:09:40 CET 2008
What kind of firewall do you have for your Hobbit? The firewall rules on my
router detect these kinds of script kiddie attacks...
On 1/25/08, Charles Jones <jonescr at cisco.com> wrote:
>
> I had a hobbit-monitored site become the victim of a DDOS syn-flood
> attack. To help detect this in the futrue and also aid
> information-gathering, I did the following, which I am sharing:
>
> 1. Made the following additions to hobbit-clients.cfg
> # Detect more than 100 half-open connections (possible syn-flood attack)
> PORT STATE=SYN_RECV MIN=0 MAX=100 COLOR=red TRACK="SYN"
> # Detect more than 2000 established connections (possible simple DDOS
> http get attack)
> PORT STATE=ESTABLISHED MIN=0 MAX=2000 COLOR=red
>
> 2. Made a small modification to hobbit-linux.sh, specifically to the
> [ports] section. I crammed it all into a single line.
> echo "[ports]"
> echo "SYN_REC Quick Stats:";SYNs=`netstat -pant 2>/dev/null | grep SYN
> | awk -F: '{print $2;}' |awk {'print $2"\t"$1'}| sort | uniq -c |sort
> -n`;if [ -n "$SYNs" ]; then echo " # Address Port";printf
> "$SYNs\n";echo =============================;else echo "No SYNs
> Found";echo =============================;fi
> # Bug in RedHat's netstat spews annoying error messages.
> netstat -ant 2>/dev/null
>
> #1 allows Hobbit to detect and alert for 2 common DDOS attack signatures
> (syn floods and plain old http overloading), as well as creating graphs
> via the "track" feature.
>
> #2 prefixes the netstat output you see in the "ports" column with a
> table of IPs that have half-open connections. It shows the address, IP,
> and what port they are "attacking". Here is an example (IPs and ports
> masked of course):
>
> SYN_REC Quick Stats:
> # Address Port
> 1 289.122.3.20 80
> 1 213.102.135.60 80
> 1 200.120.152.6 8080
> 1 201.192.9.130 443
> 1 174.231.84.4 443
> 2 191.136.92.135 80
> 2 216.122.32.240 8080
> =============================
>
> The prefixing of this data in the client message has no effect on the
> Hobbit server, as it is only looking for the netstat output in the ports
> section, and so ignores that extra data (but still displays it). So if
> the site gets a syn flood, you can check the ports column of your web
> host(s) and easily see the offending IP(s) that are performing the
> attack. Note that most "floodbots" are coded such that they spoof their
> IP addresses, so the information you gather may not actually help you
> determine who is attacking, but is still useful for temporarily
> firewalling or whatever other steps you need to take to block it.
>
> Note: this works on RHEL, so should work on RedHat/CentOS/Fedora. I
> havn't checked to see if debian/ubuntu has the same netstat parameters I
> used, so YMMV :)
>
> -Charles
>
> To unsubscribe from the hobbit list, send an e-mail to
> hobbit-unsubscribe at hswn.dk
>
>
>
--
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
Those who don't understand UNIX are condemned to reinvent it, poorly.
--- Henry Spencer
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.xymon.com/pipermail/xymon/attachments/20080125/f021ff18/attachment.html>
More information about the Xymon
mailing list