[nsp] NetFlow and DoS attacks - tuning
Roland Dobbins
rdobbins at cisco.com
Wed Dec 17 03:31:28 EST 2003
Arbor Networks (http://www.arbornetworks.com) provide commercial
anomaly-detection and traffic-analysis systems which make use of
NetFlow quite effectively, in my experience. Specifically, Arbor
Peakflow DoS is the anomaly-detection solution.
On Dec 16, 2003, at 11:22 PM, Charles Sprickman wrote:
> On Sun, 14 Dec 2003, Paul Kohler wrote:
>
>> Hi Charles,
>
>> I think the timers are what you can play with. Typically customers
>> like
>> to configure them lower than their default 15 sec for inactive and 30
>> min for active values so that possible attacks can more quickly be
>> identified. For more info check
>> http://www.cisco.com/univercd/cc/td/doc/cisintwk/intsolns/netflsol/
>> nfwhite.htm#1222819
>
> My only concern here is to not let it swamp the router... It seems
> like
> setting these lower will give me more accurate flow stats, but probably
> cause more cpu usage, correct?
>
>> - As Nathan alluded to, Flow-tools or any other app is not mandatory
>> to
>> successfully identify and mitigate a DoS attack. While an apps provide
>> additional functionality or ease-of-use, you can still use CLI.
>
> ...Unless the router is so swamped you cannot login. Then having some
> (any) netflow data for the brief periods where the router can breathe
> again is quite helpful.
>
>> - Here's a good overview presentation
>> http://www.dfn-cert.de/dfn/berichte/db093/behringer-ddos.pdf
>> it covers NetFlow but also rate-limiting, CAR, uRPF, etc...
>
> That was very interesting. I sent that around the office to help
> explain
> what a DoS attack is and show that it's not just something you can
> "fix".
>
> In the paper there's mention of Dante's tool for looking at flows for
> possible DoS attacks. It seems that they no longer have this
> available,
> this is all that Google will give me:
>
> http://archive.dante.net/security/dos/ (no link to the tool)
>
> It does seem old (2001), is anyone aware of something similar?
>
> If you could also comment on the note on page 15 about the "scheduler
> allocate" command, that would be helpful.
>
> Thanks for all the info,
>
> Charles
>
>> Paul
>>
>> At 01:13 AM 12/14/2003, Nathan Patrick wrote:
>>> I've found "show ip cache flow" to be extremely useful in diagnosing
>>> DoS
>>> attacks.
>>>
>>> Given the quantity of flow data that we archive, flow-tools searches
>>> take
>>> quite some time. It's often faster to simply hop on the router and
>>> try
>>> "show ip cache flow | inc K" to find IPs sourcing large amounts of
>>> traffic, or taking a visual look at "show ip cache flow" for random
>>> source
>>> IPs and their ingress interface. "show ip cache flow | inc <attacked
>>> IP>"
>>> is also very useful, as it lets you know what's hitting a
>>> destination.
>>> More advanced regexps can give you some interesting data.
>>>
>>> As for tuning, we set our inactive timeout to 300 seconds and active
>>> timeout to 1 minute. The inactive timeout gets flows out of the cache
>>> quickly, while the active timeout cuts up long running flows (news
>>> peers,
>>> etc.) for graphing and some other applications. Other than that,
>>> we've
>>> found the defaults to work well on NPE-400s as well as RSP4s. Note
>>> that
>>> these parameters are not intended to reduce router load, but rather
>>> help
>>> other applications.
>>>
>>> -Nathan
>>>
>>> Charles Sprickman wrote:
>>>
>>>> Hi,
>>>>
>>>> I'm very new to netflow and flow-tools, but I had to use them
>>>> tonight to
>>>> try and figure out what was being hit and where from (thanks
>>>> elr at panix!).
>>>>
>>>> After we dug up what we wanted, we started wondering about what
>>>> kind of
>>>> impact logging all the flows was having on the router (a vxr
>>>> w/npe-300),
>>>> as it was falling down under a 20,000 pps hit at a 384K SDSL
>>>> customer
>>>> behind it.
>>>>
>>>> There appear to be some tunables for flow export:
>>>>
>>>> router.bway.net(config)#ip flow-cache ?
>>>> entries Specify the number of entries in the flow cache
>>>> feature-accelerate Enable flow based feature acceleration
>>>> timeout Specify flow cache timeout parameters
>>>>
>>>> But I'm not really sure what I should be setting these to. I want
>>>> some
>>>> data during an attack, as it seems flow-tools is almost mandatory
>>>> for
>>>> figuring out what is being hit when the traffic doesn't exit the
>>>> router to
>>>> a LAN segment, but I also don't want the router to sacrifice itself
>>>> in the
>>>> process.
>>>>
>>>> Any pointers? Any real-world experience with tuning this?
>>>>
>>>> Thanks,
>>>>
>>>> Charles
>>>>
>>>> --
>>>> Charles Sprickman
>>>> spork at inch.com
>>>>
>>>> _______________________________________________
>>>> cisco-nsp mailing list cisco-nsp at puck.nether.net
>>>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>>>> archive at http://puck.nether.net/pipermail/cisco-nsp/
>>>>
>>>>
>>>>
>>>
>>> _______________________________________________
>>> cisco-nsp mailing list cisco-nsp at puck.nether.net
>>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>>> archive at http://puck.nether.net/pipermail/cisco-nsp/
>>
>> _______________________________________________
>> cisco-nsp mailing list cisco-nsp at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>> archive at http://puck.nether.net/pipermail/cisco-nsp/
>>
> _______________________________________________
> cisco-nsp mailing list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>
---------------------------------------------------------
Roland Dobbins <rdobbins at cisco.com> // 408.527.6376 voice
More information about the cisco-nsp
mailing list