Detecting Volumetric Attacks
Using the TCA Threshold Crossing Alerts and the TB Threshold Band Alerts it is easy to configure Trisul Network Analytics to detect volumetric attacks such as DDoS Distributed Denial of Service.
Configuring DDoS detection in Trisul gives you the following features
- With Packet Mode detection in as little as 10 seconds
- With Netflow Mode detection in 1-2 minutes
- Detect hosts sending or receiving exponential growth traffic
- Ability to run a script in response to an alert
- Sending Alert by Email immediately
DDoS Attack Types
DDoS attacks typically utilize a number of hosts to send large payloads to a target host. Trisul allows you to simply track all IP Addresses in real time and alert when any of them exceed threshold for the following criteria.
- Transmit or receive large volume of traffic
- Transmit or receive large number of packets
- Generate a large number of flows with TCP SYN or SYN/ACK
- Flood with ICMP or ARP
Furthermore you can configure Trisul to automatically track UDP protocols for amplification attacks like SNMP, DNS, CHARGEN, NTP and others by measuring IN vs OUT traffic and setting thresholds.
Configuration
There are two steps to configuring DDoS detection
- Using Threshold Bands to detect anomalous traffic on key uplink traffic ports.
- Using Threshold Crossing Alerts to track hosts sending huge volumes of traffic
Threshold Band Alerts for Key Uplink Ports
Threshold Bands is a dynamic adaptive thresholding mechanism which monitors traffic for 5 weeks and builds a “Profile” for expected traffic volumes. Create threshold band alerts for all key uplink ports and set a large window.
Figure: Active Flows where Threshold Banding is Enabled
Create a large Upper Margin of say 200%. This will generate an alert when anomalous traffic is generated.
Figure: Compute New Threshold Band Form
Create TCA with Thresholds
This varies from network to network, the idea is to set high enough thresholds that would trigger a DDoS.
The following TCAs should be created
Counter Group | Keys | Meter | Hi Water Mark | Sustained Intervals |
---|---|---|---|---|
Hosts | * | Received Traffic | 10Gbps | 1 |
Hosts | 100.10.0.0/16 | Received Traffic | 20Gbps | 1 |
Hosts | * | Packets | 1Mpps | 1 |
Notice how you can use patterns to create separate threshold for host groups.
The following shows a DDoS tracker for ANY host attacked with 10Gbps load with a 1 minute detection time.
Figure: Configure Email Alerts Form
Alerts Dispatch and Response
DDos Alerts are dispatched like normal TCA alerts. They are seen on screen or can be delivered instantly via E-Mail
Automated Actions
The alert message generated include the IP under attack and other details. You can use the Alert Monitor Trisul LUA API to automate responses upon receiving the alert. Some of the responses can include.
- Use GoBGP to announce a custom route
- Trigger a RTBH to block the IP under attack or BGP FlowSpec to divert traffic to a scrubbing centre
- Run any custom shell script
These integrations can be performed via the LUA API.
Dashboards
A DDoS dashboard is also available that constantly tracks the following metrics.
You can add any other information you want as well to this customizable dashboard.
UDP ingress egress ratio
UDP receive / transmit ratio used to detect amplification attacks
Total ingress vs egress
Total in vs out in network
TCP vs UDP
TCP vs UDP traffic, DDoS usually deploys UDP
Common DDoS flows
number of flows of common DDoS protocols SNMP, NTP, LDAP, CHARGEN etc
DNS SSDP ICMP NTP
track DNS and SSDP etc
DDoS Flow Monitor
Total flows active in network, number of new flows, terminations
Examples of the DDoS dashboard are shown below
Figure: DDoS Ingress vs Egress Ratio, Total Ingress vs Egress, and TCP vs UDP Traffic Modules
Figure: Common DDoS Flows, DNS-Ingress vs Egress, SSDP 1900 Modules
Figure: NTP- Ingress vs Egress, ICMP-Ingress vs Egress, DDoS Flow Monitor Modules