Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Offer ability to specify different thresholds for incoming and outgoing attacks #285

Open
pavel-odintsov opened this issue Jun 15, 2015 · 20 comments

Comments

@pavel-odintsov
Copy link
Owner

But in some cases we can't detect attack direction correctly.

@zenvdeluca
Copy link
Contributor

any plans on supporting different thresholds for protocols ? udp/tcp/icmp?

@pavel-odintsov
Copy link
Owner Author

After some code rewrite I will support this too. It's not a big deal ;)

Is it effective for mitigation in your practice?

@zenvdeluca
Copy link
Contributor

In my scenario where I am basically oferring http and https to the world, I'd love to have a more conservative threshold for tcp, and a much lower and more sensitive threshold for udp, specially on well know amplified ports such as dns/utp/ssdp/etc udp ports.

Does that make sense ?

@pavel-odintsov
Copy link
Owner Author

I see it as this. We have global thresholds for pps/bps/fps for all
protocols. By default same thresholds used for all protocols. But we will
offer per protocol thresholds for tcp/udp/icmp and they will be used
instead global limits if we enable they.

So, do you need any way for detection source of attack detection? I.e. Do
you need any way to distinguish udp detected attack or icmp detected?

On Tuesday, June 16, 2015, Vicente De Luca notifications@github.com wrote:

In my scenario where I am basically oferring http and http services to the
world, I'd love to have a more conservative threshold for tcp, and a much
lower and more sensitive threshold for udp, specially on well know
amplified ports such as dns/utp/ssdp/etc udp ports.

Does that make sense ?


Reply to this email directly or view it on GitHub
https://github.com/FastVPSEestiOu/fastnetmon/issues/285#issuecomment-112220292
.

Sincerely yours, Pavel Odintsov

@zenvdeluca
Copy link
Contributor

The global thresholds / protocol thresholds (optional/override) sounds perfect.

2nd question: source of attack its an good info in my case, as well distinguish which protocol the attack vectors is using. Both features allows us to trigger more specific countermeasure policies, giving more granularity to fight againts the DDoS in a less disruptive way.

@pavel-odintsov
Copy link
Owner Author

Roger!

2nd question is much complex. Because very often traffic going spoofed and when we get some traffic flow and try to block it we will block client.

Sure, I have some ideas for spoofing mitigation and we could try it in your env. But we will need full forward full BGP table to FastNetMon, it could be an issue sometimes.

@pavel-odintsov
Copy link
Owner Author

Part of this feature is implemented: https://github.com/FastVPSEestiOu/fastnetmon/issues/65 :)

@zenvdeluca
Copy link
Contributor

if you can breakdown the same idea for protocols, giving us abilitity to specify different thresholds for tcp/udp/icmp, and group as well, will be more than perfect to cover mostly traffic patterns.

@pavel-odintsov
Copy link
Owner Author

Yep, It could be nice, I like this feature. But I need some refactoring for it....

@pavel-odintsov
Copy link
Owner Author

Hello, folks!

We have implemented per protocol thresholds here: https://github.com/FastVPSEestiOu/fastnetmon/issues/407

This ticket has another name and will alive until we decide what to do with it :)

@zenvdeluca
Copy link
Contributor

a simple option like ban_for_outgoing = off might help a lot.
I have the interest in FNM processing outgoing flows (to send them to influxDB,etc), but not baning / calling notify / store redis for them.

@pavel-odintsov
Copy link
Owner Author

Issue with blocking fixed. Sorry :(

@VanDuy91
Copy link

Hello Pavel,
How could I ban for outgoing traffic without BGP Flowspec?
Thanks.

@pavel-odintsov
Copy link
Owner Author

pavel-odintsov commented May 24, 2019 via email

@VanDuy91
Copy link

VanDuy91 commented May 26, 2019

The variables: process_outgoing_traffic, process_incoming_traffic, enable_ban, ban_for_bandwidth, which were enable. And threshold_mbps was set but ban action just applies to incoming traffic. Anything else needs to enable?

@pavel-odintsov
Copy link
Owner Author

You have to explicitly disable processing for incoming traffic if you need only outgoing:

process_incoming_traffic = off

@VanDuy91
Copy link

You have to explicitly disable processing for incoming traffic if you need only outgoing:

process_incoming_traffic = off

Thank you.
BTW, we can't ban outgoing and incoming traffic at the same time? It's an inconvenience if we set process_incoming_traffic = off for incoming traffic and vice versa.

@pavel-odintsov
Copy link
Owner Author

pavel-odintsov commented May 26, 2019 via email

@VanDuy91
Copy link

VanDuy91 commented May 31, 2019

It's work. Thank you.

Repository owner deleted a comment from VanDuy91 Feb 5, 2022
@pavel-odintsov
Copy link
Owner Author

Advanced version can do different thresholds for incoming and outgoing traffic: https://fastnetmon.com/docs-fnm-advanced/advanced-quick-start/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants