Denial-of-Service. McAfee Network Security Platform
|
|
|
- Aldous Dixon
- 10 years ago
- Views:
Transcription
1 Denial-of-Service McAfee Network Security Platform
2 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Network Security Platform Denial-of-Service
3 Contents 1 Preface 5 About this Guide Audience Conventions Finding product documentation Overview 7 2 Types of DoS attacks handled by Network Security Platform 9 Volume-based DoS attacks Vulnerability-based DoS attacks DDoS attack tools Methods used by Network Security Platform to counter DoS attacks 13 Network Security Platform DoS detection signatures Flows Protocol parsing specifications Packet Searches Where signatures fit Threshold-based mode Learning-based mode Countering profile contamination Source IP classification Attacks handling by Network Security Platform Handling volume-based DoS attacks Handling vulnerability based DoS attacks Handling attacks that use DDoS attack tools Alerts 19 Categorical (or imbalance) anomalies Volume anomalies Percentiles Attack blocking Understanding policy editing options 23 Inbound and outbound traffic Response sensitivity Setting response sensitivity Administration Walk-through 27 IPS Settings-level options Setting thresholds Customizing DoS learning mode Sensor-level options DoS data management McAfee Network Security Platform Denial-of-Service 3
4 Contents DoS profiles DoS filters DoS related TCP settings Rate-Limiting Configurations Interface-level options Customizing DoS policy at the interface level View DoS profiles at the interface level Viewing DoS alerts in Threat Analyzer Alert Details Blocking attacks in the Threat Analyzer Editing attack settings for a DoS alert in Threat Analyzer DoS related actions using CLI commands 55 set dospreventionseverity Blocking DoS traffic from a specific host DNS spoof protection set dnsprotect dnsprotect show dospreventionprofile DOS prevention severity for tcp-syn-ack outbound is Configuring ACLs 61 9 DoS related actions using CLI Commands 63 Index 65 4 McAfee Network Security Platform Denial-of-Service
5 Preface Contents About this Guide Finding product documentation About this Guide This special topics guide provides information on how McAfee Network Security Platform detects denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks and the different mechanisms used for countering and preventing such attacks. You get information on the types of DoS and DDoS attacks handled by the Network Security Platform, and on how Network Security Platform protects the network against these attacks. This guide also gives Information on configuring Network Security Sensor (Sensor) for handling DoS and DDoS attacks through the Network Security Manager (Manager). The information in this guide relates only to the IPS Sensor. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Conventions This guide uses the following typographical conventions and icons. Book title or Emphasis Title of a book, chapter, or topic; introduction of a new term; emphasis. Bold User input or Path Code Text that is strongly emphasized. Commands and other text that the user types; the path of a folder or program. A code sample. User interface Hypertext blue Words in the user interface including options, menus, buttons, and dialog boxes. A live link to a topic or to a website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. McAfee Network Security Platform Denial-of-Service 5
6 Preface Finding product documentation Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. Finding product documentation McAfee provides the information you need during each phase of product implementation, from installation to daily use and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase. Task 1 Go to the McAfee Technical Support ServicePortal at 2 Under Self Service, access the type of information you need: To access... User documentation Do this... 1 Click Product Documentation. 2 Select a product, then select a version. 3 Select a product document. KnowledgeBase Click Search the KnowledgeBase for answers to your product questions. Click Browse the KnowledgeBase for articles listed by product and version. 6 McAfee Network Security Platform Denial-of-Service
7 1 1 Overview A denial-of-service (DoS) attack is a malicious attempt to render a service, system, or network unusable by its legitimate users. To achieve this goal, attackers usually try one of the following: Crash or disable the target service or system. Disrupt or prevent normal users from accessing the target. Saturate essential, limited resources of the target by flooding. In a distributed denial-of-service (DDoS) attack, attackers take advantage of many hosts across the Internet, which they had previously compromised, to launch a brute-force attack that starves the target of its essential resources. This guide uses the terms DoS to refer to both Denial of Service and Distributed Denial of Service. Compromised hosts are sometimes called Zombies. See also About this Guide on page 5 McAfee Network Security Platform Denial-of-Service 7
8 1 Overview 8 McAfee Network Security Platform Denial-of-Service
9 2 2 Types of DoS attacks handled by Network Security Platform In Network Security Platform DoS attacks are classified into three main categories based on their design. This chapter describes in detail the main categories. Contents Volume-based DoS attacks Vulnerability-based DoS attacks DDoS attack tools Volume-based DoS attacks Volume-based DoS attacks are statistical anomalies in the traffic monitored by a Network Security Platform Network Security Sensor (Sensor). In other words, with insight into the normal distribution and volume of traffic, the Sensor looks for significant changes in these levels, which can indicate malicious behavior. Based on the protocol used, volume-based DoS attacks can be classified as described below: IP IP fragment: In this case, an attacker may be attempting to crash a system on your network by sending a large volume of fragmented IP packets in a short period. TCP TCP SYN and FIN: This attack is caused by sending a large number of TCP SYN (SYN flooding) or FIN packets to the target host, but not responding to the packets returned by the target host. This fills up the data structures used by the target host to keep track of pending connections. Pending connections will time out eventually and free up space in the data structures. However, the attacker can cause a perpetual DoS condition by sending more SYN or FIN packets. TCP RST: This is based on a large number of TCP RST segments. An initial TCP RST packet can shut down a legitimate connection between a host and a server. An attacker can sniff and mimic the RST sequence number from a network, then send a malicious TCP RST. After a TCP connection has been torn down, receiving further TCP RST packets can cause a DoS condition, because system resources are being used to receive, check, and discard the packets. McAfee Network Security Platform Denial-of-Service 9
10 2 Types of DoS attacks handled by Network Security Platform Vulnerability-based DoS attacks Out-of-window TCP data segment: An out-of-window data segment is a segment whose sequence number falls out of the acceptable range, or "TCP receiving window" of the destination host. For example, imagine that the last byte the destination host successfully received and processed had a sequence number of and that it has a receiving window of 1024 bytes. Subsequent packets within the range of and are considered within its window. All other packets are considered out-of-window. Under normal conditions, the amount of out-of-window packets should be small. High-volume occurrences of such packets are therefore suspicious and can lead to a DoS condition. This attack may consume significant bandwidth of the target network, and result in service disruption or service quality degradation. In some cases, the targeted server system may exhaust memory, crash, or be rendered otherwise inoperative. Out-of-context TCP data segment: Each TCP packet is identified by a 4-tuple combination of source IP and port, and destination IP and port. An out-of-context data segment is one that does not match the 4-tuples of any established flow. High-volume occurrences of Out-of-context packets can cause a DoS condition and affect the network in the same manner as high-volume occurrences of out-of-window packets. HTTP flood attacks: HTTP flood attacks are caused when an attacker launches a large number of legal GET request to a target server and exhausts the processing power of the server. UDP UDP flood: When communication is established between two UDP services, an UDP flood attack is initiated by sending a large number of UDP packets to random ports of the targeted system. The targeted system is forced into sending many "Destination Unreachable" ICMP packets, thus consuming its resources and leading to DoS. As UDP does not require any connection setup procedure to transfer data, anyone with network connectivity can launch an attack; no account access is needed. Another example of UDP flood is connecting a host's "chargen" service to the "echo" service on the same or another machine. All affected machines may be effectively taken out of service because of the excessively high number of packets produced. In addition, if two or more hosts are so engaged, the intervening network may also become congested and deny service to all hosts whose traffic traverse that network. DNS spoofing: This is a type of UDP attack, which exhausts the processing power of a DNS server. ICMP ICMP Echo: This attack involves flooding the network with ICMP Echo Request or Reply packets. A flood of Echo requests to a target system makes the system busy responding to the requests. If there is a flood of Reply packets, then it is very likely that the remote attacker has forged an IP address from within your network and is sending ICMP Echo Request packets to another network. That network replies to the address in the requests, thus starting a request/reply flood between the two networks. All other ICMP (other than Echo Request and Reply): This involves a large number of ICMP packets other than Echo Request and Reply packets. Non-TCP/UDP/ICMP: This involves flooding the network with packets other than TCP, UDP, or ICMP. Packets involved in this attack may include IPSec and malformed IP packets (such as IP with bad checksums and inconsistent length). Vulnerability-based DoS attacks Unlike volume-based DoS attacks, vulnerability-based DoS attacks are generally single requests that can result in a DoS condition. Vulnerability based DoS attacks exploit vulnerabilities in the network and its systems. Such attacks keep evolving and Network Security Platform updates protect network against new type of attacks. Some well-known examples of vulnerability based DoS are as follows: 10 McAfee Network Security Platform Denial-of-Service
11 Types of DoS attacks handled by Network Security Platform DDoS attack tools 2 Attack Name TearDrop attack Ping of Death attack Land attack Description This attack involves fragmented ICMP packets with overlaps among the fragments. Such fragments cause certain implementations of the IP stack to crash or go into an infinite loop, thus leading to a DoS condition. This attack involves sending packets that exceed the maximum authorized size (65,536 bytes) to a system with a vulnerable TCP/IP stack, causing it to crash. This attack involves using IP address spoofing with the same IP address and port number in the source and destination fields, causing vulnerable systems to become unstable. DDoS attack tools DDoS attacks can be launched by using tools that are built to generate DDoS attacks. There are many DDoS attack tools. Some well-known tools are listed below: Trinoo: Trinoo is an attack tool that installs agent programs on compromised hosts and uses the agents through a master program to attack one Trinoo:or more target hosts by flooding them with UDP packets. Communication between the master and agents is password protected. Tribal Flood Network (TFN): TFN uses an attack approach similar to Trinoo and can generate multiple attacks and use spoofed IP addresses. ICMP echo request flood, TCP SYN flood and UDP flood are some of the attacks that can be launched by TFN. TFN2K: TFN2K is an advanced version of TFN with features that makes it more difficult to detect. TFN2K uses multiple protocols including UDP, TCP, and ICMP. Stacheldraht: Stacheldraht, which means "barbed wire" in German, has features that include those of Trinoo and TFN. Stacheldraht has features like encrypted communication between agents and the master program. Shaft: Shaft is a tool similar to Trinoo that can launch packet-flooding attacks. Trinity: Trinity is a flood attack tool that uses chat programs such as Internet Relay Chat (IRC). MStream: MStream is a tool based on "stream.c" attack in which access to the handler is password protected. McAfee Network Security Platform Denial-of-Service 11
12 2 Types of DoS attacks handled by Network Security Platform DDoS attack tools 12 McAfee Network Security Platform Denial-of-Service
13 3 Methods 3 used by Network Security Platform to counter DoS attacks When configured according to specific requirements, McAfee Network Security Platform can help you to prevent DoS attacks on your network. Network Security Platform Network Security Sensors (Sensors) managed by Network Security Manager (Manager) can be custom configured for a specific network to prevent DoS attacks. You can deploy Sensors on either on your Internet Service Provider's (ISP's) network or your network or both. Network Security Platform combines three methods to identify and combat DoS and DDoS attacks. Those methods are: Network Security Platform DoS detection signatures Thresholds Learning Network Security Platform signatures can identify attacks carried out using the DDoS attack tools and vulnerability based DoS attacks. The threshold and learning methods look for statistical anomalies in the traffic Network Security Platform scans, to detect volume-based DoS. With insight into the normal distribution and volume of traffic when the network is not under attack, these methods look for significant changes to those levels that indicate malicious behavior. In addition to the methods used by the Network Security Platform to detect DOS and DDoS attacks, the following options are also available in the Manager for the network administrator to take DoS attack preventive measures. TCP Settings TCP Settings in the Manager permit the configuration of settings such as, TCP Segment Timer, TCP 2MSL Timer, TCP Flow Violation, Unsolicited UDP Packets Timeout, SYN Cookie, Inbound Threshold Value, Outbound Threshold Value and Reset unfinished 3-way handshake connection. An Administrator can configure these parameter values based on the knowledge of a specific network to prevent DoS attacks. Rate-Limit Traffic Rate-limiting is used to control the rate of egress traffic sent through the ports of a Sensor. An Administrator can set appropriate values in the Manager to prevent DoS by setting Sensor port specific bandwidth limits that are relevant for preventing DoS in a particular network. See also DoS related TCP settings on page 37 Rate-Limiting Configurations on page 39 McAfee Network Security Platform Denial-of-Service 13
14 3 Methods used by Network Security Platform to counter DoS attacks Network Security Platform DoS detection signatures Contents Network Security Platform DoS detection signatures Threshold-based mode Learning-based mode Attacks handling by Network Security Platform Network Security Platform DoS detection signatures Network Security Platform uses attack signatures to detect communication between many known DDoS attack tools. The attack signatures identify the specific communication between utilities used to create DDoS attacks, such as, Trinoo, Stacheldraht, and Trinity. For example, the signatures can identify the communication from a Trinity master as it instructs its Zombies to initiate a distributed attack. Network Security Platform also uses exploit signatures for DoS attacks that are not caused by traditional means such as volume overload. For example, the HTTP: Microsoft IIS...SLASH... DenialofServiceexploit identifies a single request that prevents older IIS servers from responding to clients until they are restarted. The Sensor uses signatures to perform different levels of traffic processing and analysis. Network Security Platform signatures operate on a framework of Flows, Protocol parsing and Packet searches to detect vulnerability based DoS attacks and attacks using DDoS attack tools. Flows At the highest level, the Network Security Platform addresses UDP and TCP traffic based on the concept of a flow. Flows are defined by their protocol (either UDP or TCP), source and destination ports, and IP addresses of their endpoints. UDP does not contain the concept of "state" that TCP does, so the Sensor implements a timer-based flow context for UDP traffic. After dividing traffic into flows, the Sensor makes use of port mapping, or in the case of traffic running on non-standard ports, intelligent protocol identification, to pass each flow to the appropriate protocol parsing mechanism. It is also worth noting that Network Security Platform provides you with the ability to specify whether your signature will look at the complete flow, one direction of the flow, or restrict itself to data occurring within single packets of the flow. Precise control of this detection window is necessary for accurate detection of attacks. Protocol parsing specifications Protocol specifications (Network Security Platform's protocol parsing mechanisms) parse through network flows to validate traffic and divide it into protocol fields, which may then be actively tested against Network Security Platform-supplied attacks or User Defined Signatures. By dividing protocol traffic into the appropriate fields, Network Security Platform can perform matches against the most specific field or subfield pertinent to an effective attack, thus supporting signatures with very low false-positive rates. Since the parsing process is fully stateful, it allows detection of anomalies in the protocol's behavior. Additionally, this parsing makes it possible to provide an additional benefit to signature writers in the form of qualifiers. Qualifiers are tests that are embodied in the name of a particular protocol field. For example, rather than specifying that an HTTP request method must be "GET", the Network Security Platform system allows the use of "http-get-req-uri" as the name of the field, saving the requirement of providing that test in the signature, and the Sensor from having to perform an extra pattern match. 14 McAfee Network Security Platform Denial-of-Service
15 Methods used by Network Security Platform to counter DoS attacks Threshold-based mode 3 Packet Searches Traffic flows that are not identified as belonging to any particular protocol are passed to the Packet Search Protocol Specification Engine for further parsing. The Network Security Platform presents each direction of the flow to Network Security Platform-defined attacks and to any User Defined Signatures. Tests against packet search traffic typically take the form of specific ordered pattern matches to prevent false positives and performance problems. Where signatures fit Signatures tie together elements of flows, protocol parsing and packet search framework to derive specific "fingerprints" for network traffic from smaller building blocks. In essence, signatures are like DNA tests. They can identify both specific people and relatives of that person. In the intrusion-detection case, the relatives may be a collection of buffer overflow attacks against a certain piece of software, and the particular person would be a specific piece of exploit code. While the two are not greatly different, Network Security Platform adopts a convention of differentiating between anomaly-based attack signatures (not to be confused with anomaly-based detection for Denial of Service attacks) and signatures pertaining to a specific attack. The main difference is that while anomaly-based signatures examine the network for unexpected or non-conforming behavior, signatures pertaining to specific attacks will often look for a very particular indicator, such as a flag with a particular value, or a specific string's presence. Signature-based anomaly attacks know what to expect in normal traffic, and trigger when they get something else. Normal attack signatures look for specific misbehavior. When defining attacks to detect and protect from vulnerabilities, a blended set of signatures are often defined which check for behavioral anomalies as well as specific exploit strings. Using this mechanism, all possible attempts to exploit the vulnerability can be detected. Threshold-based mode In Threshold Mode, the Sensor monitors the network traffic for packet floods, such as too many IP fragments, transmitting through from a source to a destination as detected within a Sensor interface or sub-interface. When configuring the DoS policy or customizing at the interface or sub-interface level, you must specify the count and interval (rate in seconds) for the threshold attacks you want to detect. The Sensor sends an alert (if configured to do so in the DoS policy) when the traffic exceeds the customized thresholds for an enabled attack. You can also enable a notification for an attack if it warrants special attention. This method requires that you to fully understand your typical traffic pattern in order to pick "good" threshold values; otherwise it can produce false alarms due to traffic fluctuations, such as "flash crowds" for example, everyone logging on the network at 9 a.m. or other legitimate increased traffic. For threshold-based attacks, a Sensor monitors both inbound and outbound traffic. Although default values are provided for thresholds and intervals, you must configure the actual thresholds and intervals for each DoS Threshold Mode attack you want to detect. Customization of DoS thresholds works best after researching the current levels to be defended for each DoS threshold. This helps you to determine exactly what counts and intervals are best for protecting your network. McAfee Network Security Platform Denial-of-Service 15
16 3 Methods used by Network Security Platform to counter DoS attacks Learning-based mode Learning-based mode A new Sensor runs for its first 48 hours in learning mode. After 48 hours are complete, the Sensor automatically changes to detection mode, having established a baseline of the "normal" traffic pattern for the network, or a long-term profile. The assumption is that no DoS attack takes place during those first 48 hours. After moving to detection mode, the Sensor continues to gather statistical data and update its long-term profile. In this way, the long-term profile evolves with the network. The Sensor also builds short time profiles with a time window of few minutes. Learning mode profiles can be customized at the Sensor_Name node level. Learning Mode profiles can be reset (re-learned) or reloaded at this level. This is all performed in the Configuration page of the Manager. Sub-interfaces and individual CIDR hosts within a VLAN tag or CIDR block can be created and protected against DoS attacks with specific learning mode settings. This is useful in preventing a server in your DMZ or other location from being shut down by a DoS attack. A separate profile is created for each resource. The Sensor uses the following checks and counter checks to ensure accuracy of detection: Counter profile contamination Source IP classification If there is a change in the routing scheme, McAfee recommends instructing the Sensor to relearn the network so that it can create a new baseline. Countering profile contamination The goal behind the long-term profile is to define normal traffic levels. The Sensor can identify anomalous spikes in traffic with reference to the defined normal levels. The Sensor also uses the gathered statistical data to calculate short-term profiles (statistical data averaged over a time window of a few minutes). If a short-term profile that includes DoS attack data is used to update the long-term profile, it contaminates the long-term profile. Network Security Platform uses the following countermeasures to help prevent contamination: When in detection mode, the Sensor temporarily ceases updating the long-term profile if too many statistical anomalies are seen over a short period. The Sensor uses percentile measure. A few large spikes in the short-term data will probably upset a simple average, but are less likely to affect a percentile measure. For example, imagine a group of four students taking an exam with percentile measure ranges of 0-29, 30-49, and for judging the effectiveness of the exam. Let us say three of the students receive grades of 95%, 93%, and 92% and the fourth receives a grade of 0%. The average score is only 70% but three of the four students are still in the range. The teacher can therefore use the percentile ranges as a valid measure for judging the effectiveness of the exam. Source IP classification The Sensor builds 20 unique source IP profiles; one profile for each tracked packet type in each direction. 16 McAfee Network Security Platform Denial-of-Service
17 Methods used by Network Security Platform to counter DoS attacks Attacks handling by Network Security Platform 3 Within each source IP profile, the entire IP address space is divided into a maximum of 128 mutually exclusive IP address blocks, or bins, much in the same way CIDR addressing divides the address space. Each bin is uniquely identified by a prefix and prefix length (from 2 to 32 bits). An IP address falls into a bin when the first 'n' number of bits of the address matches the bin's prefix. The sensor then associates each source IP with a particular bin in the appropriate profile. Each bin has the following two properties: The percentage of long-term (good) traffic originating from the source IPs that belongs to this bin. The percentage of the overall IP address space that the IP range in this bin occupies. With the source IPs properly classified, the Sensor can now protect a network from DoS attacks. When a statistical anomaly occurs, the Sensor takes the following actions on the source IP profile in question: The Sensor blocks all packets with source IPs in the bins that occupy a large percentage of the IP space, but represent a small percentage of the long-term traffic. This combats attacks that are generated with random, wide-ranging, spoofed source IP addresses. The Sensor blocks all packets with source IPs in the bins that occupy a large percentage of the short-term traffic together with a significantly higher percentage of short-term traffic than historically seen. This combats attacks that are initiated from a handful of networks with authentic source IP addresses. The Sensor does not block packets with source IPs in the bins that occupy a small percentage of the IP space and represent a high percentage of the long-term traffic. This protects against blocking hosts that are known to be good. The exception to the third criterion is when the traffic also meets the second criterion. In other words, source IPs from the "good" bins are blocked if their short-term traffic level is significantly higher than their peak long-term level. This combats attacks that are initiated from good hosts that have recently been compromised. Source IP classification is more effective than using devices such as firewalls that limits the rate of SYN packets on the network to block DoS attacks. The key difference in such an approach and Network Security Platform is that a rate-limiting device blocks traffic randomly. "Good" traffic has the same probability of being blocked as attack traffic. On the other hand, source IP classification used by Network Security Platform attempts to differentiate good traffic from attack traffic, so attack traffic is more likely to be blocked. Attacks handling by Network Security Platform Attacks handling by Network Security Platform Network Security Platform handles different types of DoS attacks by applying a combination of methods involving Network Security Platform signatures, thresholds and learning. Handling volume-based DoS attacks A DoS attack often occurs at the firewall or in the DMZ, particularly DMZ Web and mail servers. Network Security Platform offers two ways to handle volume-based DoS. First is the threshold-based mode. In this mode, the Sensor monitors traffic volumes that exceed the configured threshold. The second method is learning-based mode in this mode, the Sensor learns long-term normal behavior and compares it to short-term observed behavior. Combining threshold and learning methods greatly improves reliability of detection. McAfee Network Security Platform Denial-of-Service 17
18 3 Methods used by Network Security Platform to counter DoS attacks Attacks handling by Network Security Platform See also Threshold-based mode on page 15 Learning-based mode on page 16 Handling vulnerability based DoS attacks To prevent vulnerability based DoS attacks, a Sensor attempts to capture the manifestation of attacks in signatures, and if configured to do so, apply specific countermeasures based on each signature. This is very effective for known attacks with well-known signatures. For example, Network Security Platforms detection mechanisms enable a signature to identify every HTTP traffic flow, every HTTP traffic flow using the GET mechanism, every HTTP traffic flow using GET with /cgi-bin/calendar.pl as the path and even every GET with that path and a parameter named month with a value of February. Network Security Platform supports the aggregation of multiple signatures into every attack. Each signature within an attack can be more or less specific to identify everything from generic network activity that affects a given platform in a particular way to a specific piece of code that has very specific and identifiable effects. Based on their specificity and severity, signatures are assigned different confidence and severity values. When a network event occurs that matches an existing Network Security Platform attack, several signatures (generic and specific) within that attack may be triggered. When alert throttling is enabled, the Network Security Platform Sensor correlates multiple triggering events automatically to raise a single alert with the highest confidence level. See also Vulnerability-based DoS attacks on page 10 Network Security Platform DoS detection signatures on page 14 Handling attacks that use DDoS attack tools Network Security Platform uses attack signatures to identify attacks generated by DDoS attack tools. Network Security Platform signatures can identify attacks from specific DDoS Attack Tools. An alert is generated in the Threat Analyzer when an attack from DDoS attack tools is detected. See also DDoS attack tools on page 11 Network Security Platform DoS detection signatures on page McAfee Network Security Platform Denial-of-Service
19 4 Alerts 4 Alerts are raised in the Threat Analyzer of the Manager. DoS related alerts are raised when Sensor detects volume-based DoS attacks, vulnerability based DoS attacks and attacks by DDoS attack tools. Network Security Platform uses attack signatures to detect communication between many known DDoS attack tools as also to detect vulnerability-based attacks. Alerts are raised in the Threat Analyzer when such attacks are detected. In the case of volume-based attacks, Sensor looks for statistical anomalies in short-term and long-term profiles. The Sensor compares the short-term profile against the long-term profile. If there is a significant difference in the traffic levels, an alert is generated, and the Sensor blocks traffic with statistical anomalies if configured to do so. The alert is generated because the Sensor has detected one of two varieties of statistical anomalies: Categorical (or "imbalance") anomalies Volume anomalies Statistical anomalies are the result of an attack when the long-term profiles accurately reflect the normal traffic for a given network. However variations in network traffic, due interventions such as changes in the routing scheme can cause anomalies. In such cases you need to rebuild the profile from scratch using the Rebuild the DoS Profiles (start the learning process from scratch) option in the DoS Data Management page (<Admin_Domain_Name> / IPS Settings / Sensor_Name Advanced Scanning DoS Data Management). See also DoS data management on page 32 Contents Categorical (or imbalance) anomalies Volume anomalies Attack blocking Categorical (or imbalance) anomalies Certain types of packets are intrinsically related. Without ICMP Echo Reply, for example, ICMP Echo Request would be of little use. Similarly, without FIN and RST, you would be able to begin a TCP connection, but not end it. McAfee Network Security Platform Denial-of-Service 19
20 4 Alerts Volume anomalies Network Security Platform detects two types of categorical anomalies: ICMP Echo Anomalies (Echo Request and Echo Reply) TCP Control Segment Anomalies (SYN, SYN ACK, FIN, and RST) Network Security Platform records the distribution of these types of packets in its long-term profile. A significant change in the distribution of these packet types in the short term is a reliable indication of malicious behavior. For example, Network A might have 50 Echo Replies for every 50 Echo Requests, whereas Network B might have only 40 replies for 60 requests. In this case, the distribution would be 50% / 50% and 40% / 60%, respectively. In practice, distribution differs from network to network, but usually maintains a relatively consistent average over an extended period. A sudden and drastic (short-term) change in the distribution of ICMP Echo packets or TCP control packets is historically indicative of malicious behavior, if not an outright attack. Volume anomalies Network Security Platform also tracks rapid increases in the volume, or intensity, of traffic. To simplify the analysis of volume anomalies, the self-learning algorithm categorizes all packets into one of the following eight types: IP fragment TCP SYN and FIN ICMP echo (request and reply) TCP RST All other ICMP Non-TCP/UDP/ICMP UDP Out-of-window and out-of-context TCP data segment See also Volume-based DoS attacks on page 9 Percentiles One of the methods that the Network Security Platform uses to deal with volume anomalies is to establish thresholds based on packet rate and burst size for different packet types. Changes to these established thresholds indicate threats and are dealt with accordingly. To measure volume changes over time, Network Security Platform establishes two percentiles for each of the packet types. For a given packet type, the Sensor looks at the distribution of the following: Short-term packet rate Traffic burst size The Sensor analyzes these distributions to establish thresholds that the short-term averages must not typically exceed. For example, Network Security Platform might determine that, for a given packet type, 95% of the short-term profiles averaged a rate of X packets per second or fewer, and a packet size of Y bytes or smaller. When the average rate exceeds X packets per second and the pocket size exceeds Y bytes, Network Security Platform analyzes the significance of change. 20 McAfee Network Security Platform Denial-of-Service
21 Alerts Attack blocking 4 If the change is significant and matched a threat perception, an alert is raised. Only one statistical anomaly alert is sent per attack every two minutes. Attack blocking A Sensor can be configured to block traffic when statistical anomalies occur. Blocking DoS traffic is more involved than blocking normal exploits because the source is often unclear. For example, the "success" of a distributed attack may depend on the quantity of compromised hosts generating traffic together, rather than a single host generating a significant volume on its own. This complicates the blocking process because a Sensor cannot merely block hosts that individually generate large volumes of traffic. Moreover, DoS attack tools typically generate traffic with spoofed IP addresses, so attempting to block them gains nothing and wastes resources. Instead, Network Security Platform classifies source IP addresses as IP profiles to differentiate between good and bad hosts. It then uses these IP profiles to determine a blocking scheme for the Sensor. See also Source IP classification on page 16 McAfee Network Security Platform Denial-of-Service 21
22 4 Alerts Attack blocking 22 McAfee Network Security Platform Denial-of-Service
23 5 Understanding 5 policy editing options The Leaning Mode and Threshold Mode settings in the DoS Attacks tab of the Edit IPS Policy page have Inbound, Outbound and Bidirectionalsub-tabs. The Leaning Mode sub-tab also has the Response Sensitivity for all DoS Learning Attacks option. It is important to understand how these options work before actually setting them. Click <Admin_Domain_Name> / IPS Settings >Policies IPS Policies, select a policy and click View / Edit to view the Edit IPS Policy page. Contents Inbound and outbound traffic Response sensitivity Setting response sensitivity Inbound and outbound traffic In learning-based detection, DoS policy applies to inbound, outbound, and bidirectional traffic. Inbound traffic is that traffic received on the port designated as "Outside" (that is, originating from outside the network) in In-line or Tap mode. Typically, inbound traffic is destined to the protected network, such as an enterprise intranet. Outbound traffic is that traffic sent by a system in your intranet, and is on the port designated as "Inside" (that is, originating from inside the network) in In-line or Tap mode. There are also learning mode attacks that do not have an "Inbound" or "Outbound" directional association, specifically ICMP ECHO Anomaly and TCP Control Anomaly. These attacks are classified as "Bidirectional". When configuring with the Policy Editor, you can customize severities and enable an admin notification for a number of categories. Report generation and the Threat Analyzer can help determine the types of statistical information that are affecting your network's performance. Sensors can only alert in case of ICMP Echo Anomaly and TCP Control Anomaly attacks but cannot block them, even when in In-line mode. Response sensitivity Response sensitivity determines how much (volume and duration) a traffic surge is considered abnormal and if an alert should be raised. Setting the response sensitivity to "Low" tells the detection algorithm to be tolerant of traffic spikes before raising alerts. The system becomes more sensitive to traffic surges if the response sensitivity is set to "High." The implications of setting the sensitivity to High are ambiguous: "High" makes it possible to detect even small-scale DoS attacks while at the McAfee Network Security Platform Denial-of-Service 23
24 5 Understanding policy editing options Setting response sensitivity same time making the system more prone to false positives the opposite can be said for Low sensitivity. These settings are therefore meaningful when set with an in-depth knowledge of a specific network. DoS learning mode response sensitivity is configured during policy creation and is enforced at the interface and sub-interface levels when policies are applied at these levels. Setting response sensitivity The way in which a Sensor determines that a change is significant enough to warrant an alert varies from profile to profile and packet type to packet type. Network Security Platform maintains a separate history for each combination of profile and packet type. It consults the unique history to determine a precise level of sensitivity for that combination. For example, if the normal volumes of IP fragments vary very little between snapshots for profile A, a small change in volume may trigger an alert. Profile B might see the volumes of TCP resets vary from small to large between short-term snapshots under normal conditions. In this case, the algorithm will be significantly less severe about sending alerts when a change is recorded. The DoS Attacks tab in the Edit an IPS Policy or Add an IPS Policy editors have a Learning Mode sub-tab in each direction (Inbound, Outbound and Bidirectional). The administrator can modify the Response Sensitivity level on each tab to exercise a limited amount of control over how responsive Network Security Platform is to traffic fluctuations. Figure 5-1 Adding an IPS policy The Response Sensitivity level controls how much of a short-term deviation from the long-term profile is enough to trigger an alert. Each level translates into statistical thresholds. A high sensitivity translates into lower thresholds, so alerts are generated more easily. A low sensitivity translates into higher thresholds and alerts are therefore less likely to be triggered. 24 McAfee Network Security Platform Denial-of-Service
25 Understanding policy editing options Setting response sensitivity 5 For example, if left at its default value of Low, Network Security Platform might raise an alert when the short-term traffic volume for a given combination of profile and packet type reaches a 98th percentile. Changing the response sensitivity to High might cause Network Security Platform to alert when the short-term traffic volume reaches the 95th percentile. The way in which the response sensitivity values are quantified depends directly on the history gathered for the profile and packet type in question. There is a Response Sensitivity option on each of the Inbound, Outbound, and Bidirectional tabs. The Inbound and Outbound tabs contain volume attacks for each of the tracked packet types, and the Bidirectional tab contains the two categorical attacks. The administrator has the choice to be more or less severe for a given direction or variety of anomaly. Categorical attacks are bidirectional because they are monitored in both directions. For example, when Network Security Platform monitors ICMP echo packets, it monitors ICMP inbound requests, inbound replies, outbound requests, and outbound replies as a group. In this way, a significant change in the overall distribution of ICMP echo packets causes a statistical anomaly. McAfee Network Security Platform Denial-of-Service 25
26 5 Understanding policy editing options Setting response sensitivity 26 McAfee Network Security Platform Denial-of-Service
27 6 6 Administration Walk-through In this section, we step through the DoS-specific sections of the Manager. Contents IPS Settings-level options Sensor-level options Interface-level options Viewing DoS alerts in Threat Analyzer IPS Settings-level options The following IPS Settings-level options are available from the IPS Polices sub-tab of the Polices tab of the IPS Settings node in the configuration page of the Manager. Set Thresholds Customize DoS learning mode Setting thresholds The threshold method provides administrators with a way to trigger alerts if a pre-configured traffic volume threshold is exceeded. The key to successfully using thresholds is to have an understanding of the normal traffic levels on the network. In most cases, an external device such as, a Sniffer is used to baseline the network, and the initial levels are set according to that data. Once a baseline has been established, the administrator can enable the relevant threshold for an attack and configure each with values that make sense for a particular network. McAfee Network Security Platform Denial-of-Service 27
28 6 Administration Walk-through IPS Settings-level options Follow this procedure to set threshold values for an attack: Task 1 Click <Admin Domain Name> / IPS Settings Policies IPS Policies to view the IPS Policies page. Figure 6-1 Setting threshold 2 Select a policy and click View / Edit to view the Edit IPS Policy page. 3 Click the Threshold Mode sub-tab of the DoS Attacks tab to view the attacks listed. 4 Select the attack for which you want to set thresholds and click View / Edit to view theedit Threshold Attack Detailspage. 5 Set the attack threshold: For example, select Customize Threshold Valueand Customize Threshold Interval check boxes, and type 1000 and 1 respectively as values for these selections in the Edit Threshold Attack Details page for Inbound Link Utilization (Bytes/Sec) Too High attack. Such a setting will enable an alert to be sent if a Sensor sees 1000 or more Inbound Link Utilization within a 1-second interval. Figure 6-2 Threshold value The Threshold method can be configured only to send alerts; traffic meeting or exceeding the pre-defined thresholds cannot be blocked. The Threshold method is used mostly for troubleshooting. The administrator might want to be notified if bandwidth utilization goes above a pre-defined limit. In contrast to the Threshold method, the learning-based method automatically establishes a baseline and if configured, can alert or block if that baseline is exceeded in such a way that it constitutes an attack. See also Learning-based mode on page McAfee Network Security Platform Denial-of-Service
29 Administration Walk-through IPS Settings-level options 6 Customizing DoS learning mode Follow this procedure to customize the DoS learning mode for a selected policy: Task 1 Open the required policy in the IPS Policy Editor. The navigation path to the Policy Editor is <Admin Domain Name> / IPS Settings Policies IPS Policies. 2 Select a policy listed in the IPS Polices list and click View / Edit to view the Edit IPS Policy page. 3 Click the DoS Attacks tab; the Inbound sub-tab opens with the Learning Mode sub-tab. Network Security Platform provides enforcement of DoS traffic profiling by direction of the flow: Inbound, Outbound, or Bidirectional. You must enable attacks for each direction separately. By default, severity, Sensor response, and blocking of all Learning Mode attacks Inbound, Outbound, and Bidirectional are disabled. You must manually enable these for each learning attack you want to detect through the application of a policy. Figure 6-3 IPS edit policy Selecting a value from the Response Sensitivity for all DoS Learning Attacks drop-down list sets the learning curve for the profile to be less (Low), moderately (Medium), or very sensitive (High). For example, if you want the Sensor to be sensitive to slight traffic deviations, select High. See: Response Sensitivity, Setting Response Sensitivity. 4 Select the required attack and click View / Edit to customize it. McAfee Network Security Platform Denial-of-Service 29
30 6 Administration Walk-through IPS Settings-level options 5 View the DoS attack you selected for customization. The fields are as follows: Attack Name: Full name of the attack. Severity: Potential impact of the attack. Attack Description: Click to open the full attack description. Annotate Description: Click to add your annotations for an attack in the attack encyclopedia. Benign Trigger Probability: Displays a value that indicates the chance that detection for the attack will trigger an alert falsely. Figure 6-4 Details of the attack 6 When the Customize Severity check box is selected, the default severity level is set to 7 (High). Select a different severity level from the Customize Severity drop-down list, if you want the attack to be of a higher or lesser priority. 30 McAfee Network Security Platform Denial-of-Service
31 Administration Walk-through Sensor-level options 6 7 In the Sensor Response area, select Customize and Enable Alert check boxes to activate the alert for this attack. Figure 6-5 Details of the attack - Sensor response To customize notifications, first select Customize next to each response under Notifications and select the , Pager, Script, SNMP, Auto. Ack. and Syslog check boxes as required. 8 Select the Drop DoS attack packets of this attack type when this attack is detected check box if you want to drop offending DoS packets when they are detected. You must set this for each learning mode attack you want dealt with in this manner. This only applies to a Sensor deployed in In-line mode. Note: For detailed information on customization of attack response, see How Customization of Attack Response Works. See also Response sensitivity on page 23 DoS related actions using CLI Commands on page 4 Setting response sensitivity on page 24 Sensor-level options The following Sensor-level DoS related options are available in the Manager: DoS data management DoS related TCP settings DoS profiles Rate Limiting configurations DoS filters McAfee Network Security Platform Denial-of-Service 31
32 6 Administration Walk-through Sensor-level options DoS data management The DoS Data Management page displays information and options on the DoS profiles for the selected Sensor. Task 1 Select <Admin Domain Name> / IPS Settings / Sensor_Name Advanced Scanning DoS Data Management to view the DoS Data Management page. Figure 6-6 DoS data management 2 The DoS Data Management page lists the following information and options: DoS Profiles on Manager DoS profiles uploaded to the Manager are listed here. These profiles can be selected for restoration to the Sensor when Restore a DoS Profile (Manager to device) option under DoS Profile Upload and Restoration is selected. DoS Profile Learning Rebuild the DoS Profiles (start the learning process from scratch) Typically, this is only required when: It is known that a DoS attack occurred during the initial learning phase, contaminating the long-term profile. There has been a significant change in network traffic, for example, an overhaul to the routing infrastructure. When a port runs in learning mode, it does not analyze traffic for DoS attacks. You can infer whether DoS attack has occurred during the initial phase or not by reading situations specific to your network. Force the IPS Sensor into Detection Mode (bypass learning) You can force a Sensor into detection mode before the normal 48-hour minimum learning period. This option must be reserved for testing and troubleshooting. Manage DoS Packet Copying Actions (not supported on M-series and N-450 Sensors) Enable copying of DoS packets to Response port(s) Disable copying of DoS packets to Response port(s) 32 McAfee Network Security Platform Denial-of-Service
33 Administration Walk-through Sensor-level options 6 Because of the significant traffic DoS attacks produce, Network Security Platform does not collect DoS related packet logs for forensic analysis. Instead, you have the option to copy DoS packets to a Sensor response port to which you can attach a packet-capturing device. The response port for this purpose is specific to the Sensor model. For example, the I-2700 uses its third response port (R3) for this purpose. One way to know which interface is used for a given model is to go through the motions of enabling the option. The user interface includes the response port number as it prompts you to confirm your choice. DoS Profile Upload and Restoration Upload a DoS Profile (device to Manager) Restore a DoS Profile (Manager to device) You can upload the current long-term profiles from the Sensor to the Manager or restore previously uploaded profiles. In most circumstances, there is no need to upload and restore profiles. The exceptions include: The Sensor fails to detect an attack. In this case, the Sensor mistakenly learns the bad traffic pattern as good. A previous profile can be restored to replace the contaminated one, if one was saved. The Sensor is used for testing that skews the long-term profile. To bring the Sensor back in good standing, a profile is saved, the testing is performed, and the previously saved profile is restored. A change to the quantity of interfaces/sub-interfaces is made, but the change needs to be reversed. For example, you add a new sub-interface, which also changes the quantity and makeup of DoS profile. You then decide to back out of the change. Restoring a profile eliminates the requirement to go through the re-learning phase. Rebooting a Sensor does not return it to learning mode. A Sensor stores long-term data and picks up where it left off when the reboot started. DoS profiles A DoS profile is an analysis of network traffic with reference to the normal traffic flow captured during the learning period of a Sensor. DoS profiles of the selected Sensor are displayed in the DoS profiles page. The profiles can be viewed for information in this page. McAfee Network Security Platform Denial-of-Service 33
34 6 Administration Walk-through Sensor-level options Follow this procedure to view the DoS profiles for a Sensor: Task 1 Select <Admin Domain Name> / IPS Settings / Sensor_Name Advanced Scanning DoS Profiles to view the DoS Profiles page. The DoS Profile page displays the status (Detection or Learning) of each DoS profile as well as the time of transition from one mode to the other. Figure 6-7 DOS Profile - List A DoS profile defines a grouping of traffic for which the Sensor maintains unique profiles. 2 Select a profile and click View to view the profile for the selection. The information displayed is for either Inbound or Outbound traffic for the following measures: Measure tcp-control icmp-echo-count udp-rate icmp-rate ip-frag-rate tcp-rst-rate rejected-tcpseg-rate rejected-pkt-rate syn-fin-rate icmp-echo-req&rep-rate 3 Select a Direction and Measure. 34 McAfee Network Security Platform Denial-of-Service
35 Administration Walk-through Sensor-level options 6 4 Click View again to see the DoS profile for a selected direction and measure. Figure 6-8 DoS profile - Measure selection Figure 6-9 DoS profile - Advanced scanning The profiles show a comparative display of Short Term and Long Term distribution for the selected profile. The Packet rate tab shows the Packet rate in the last 1 minute. When reading the chart, it is helpful to remember that: The long-term profile is the compilation of the short-term profiles. The horizontal axis contains buckets of the various packet rates. The vertical axis indicates the percentage of those rates falling into each bucket. If you select a profile, which is still in the learning mode, the following message is displayed, "NOTE: The VIDS is still in learning mode". DoS profile limits The limit to the quantity of DoS profiles that can be configured per Sensor is unique for each Sensor model. The details are as follows: I-Series Maximum DoS profiles supported McAfee Network Security Platform Denial-of-Service 35
36 6 Administration Walk-through Sensor-level options I-4010 I-4000 I-3000 I-2700 I-1400 I ,000 5,000 5, M-Series Maximum DoS profiles supported M-8000 M-6050 M-4050 M-3050 M-2750 M-1450 M ,000 5,000 5,000 5, DoS filters Click <Admin_Domain_Name> / IPS Settings / <Sensor_Name> Advanced Scanning DoS Filters to view the DoS Filters page. The DoS Filterspage displays a list of interfaces that will potentially drop DoS packets. DoS packets are not dropped by default, so the DoS Filters list is empty as per default configuration. Figure 6-10 DoS filters When you use the Policy Editor to edit the inherited DoS policy that is applied to an interface in thedos Policy page for the interface (<Admin_Domain_Name>/ IPS Settings / Sensor_Name / <Interface_Name>>Scanning >DoS Policy), and change the default blocking settings, thereby applying a filter; the applied filter is displayed in the DoS Filters page. The filters displayed are for a unique combination of Resource, Measure, Direction and Filter End Time. Figure 6-11 DoS filter - Advanced scanning When blocking is enabled from the IPS Policy Editor, the Filter End Time has a value of ALWAYS. In this case, the packets are blocked from the attacking source until the attack is over. The Filter End Time option becomes applicable when an attack is blocked from the drill-down option of the Threat Analyzer. In that case, we can stipulate that the blocking action be applied to the interface on which that alert was generated for a specified amount of time. For those line items listed in the DoS Filters page the end time can be extended by selecting the Filter and clicking Extend. 36 McAfee Network Security Platform Denial-of-Service
37 Administration Walk-through Sensor-level options 6 See, Blocking Attacks in the Threat Analyzer. The blocking action can be configured for volume anomalies only; it cannot be configured for categorical anomalies. See also Blocking attacks in the Threat Analyzer on page 51 DoS related TCP settings The TCP Settings page enables configuration of TCP parameters. Some of these parameters are relevant for preventing DoS attacks. Based on the knowledge of your network, you can configure suitable options with specific reference to your network to prevent DoS attacks. Task 1 Click <Admin_Domain_Name / IPS Settings / Device_Name Advanced Scanning >TCP Settings to view the TCP Settings page. Figure 6-12 TCP settings for DoS 2 Of the configurable parameters, the following parameters are particularly relevant for configuring your TCP settings to prevent DoS. After making configuration changes, clickupdate. You need to push the changes to the Sensor (<Admin_Domain_Name> / IPS Settings / Device_Name Configuration Update >IPS Sensoror <Admin_Domain_Name / IPS Settings Configuration Update IPS Sensors) for the update to take effect. McAfee Network Security Platform Denial-of-Service 37
38 6 Administration Walk-through Sensor-level options TCP Parameter TCP Segment Timer (in seconds) TCP 2MSL Timer (in seconds) TCP Flow Violation Unsolicited UDP Packets Timeout (in seconds) Description Time to wait for the out of order segments to become ordered before dropping them. Time to wait for a connection control block to be freed before it is torn down. The maximum segment lifetime (MSL) is the amount of time that a packet can be in transit on the network. TCP flow violation occurs when a packet is received for a connection that does not exist, such as an ACK packet when no SYN for a connection has been received. TCP flow violation consumes network resources by manipulating the way a TCP packet communication works, thus causing a DoS attack. Drop down choices: Permit: For out-of-order packets, the Sensor holds packets up to the number of seconds set in the TCP Segment Timer option for re-assembly before performing inspection. If re-assembly fails because some packets are still missing, the Sensor simply forwards the traffic. When the TCP state is not established, the Sensor allows the packets to pass through. Deny: For out-of-order packets, the Sensor holds packets up to the number of seconds set in the TCP Segment Timer option for re-assembly before performing inspection. If re-assembly fails because some packets are still missing, the Sensor drops the traffic. When the TCP state is not established, the Sensor drops the traffic. Permit out-of-order (the default setting): The Sensor allows out-of-order packets to continue to transmit without processing. When the TCP state is not established, the Sensor allows the packets to pass through. Deny no TCB (Deny if State not established): When the TCP state is not established, the Sensor drops the traffic. Stateless Inspection: The Sensor detects attacks without requiring a valid TCP state. This option should be used only when Sensors are placed in a network where the Sensors do not see all packets of a TCP flow like in an asymmetric network configuration. Time to wait to receive a response packet for a sent packet. If time not met, the packet is dropped. 38 McAfee Network Security Platform Denial-of-Service
39 Administration Walk-through Sensor-level options 6 TCP Parameter SYN Cookie Description SYN cookies are used to counter SYN flood attacks. With SYN cookies enabled, whenever a new connection request arrives at a server, the server sends back a SYN+ACK with an Initial Sequence Number (ISN) uniquely generated using the information present in the incoming SYN packet and a secret key. If the connection request is from a legitimate host, the server gets back an ACK from the host. Drop down choices: Disabled: disable SYN cookies Inbound Only: use SYN cookies for inbound traffic only Outbound Only: use SYN cookies for outbound traffic only Both Inbound and Outbound: use SYN cookies for inboundand outbound traffic Caution: Do not enable SYN cookies when passing MPLS traffic through a Network Security Sensor. Note 1: Sensors using SYN cookie settings must be in in-line mode. If you do not have any ports in in-line mode, configure at least one port to be inline. Note 2: A Sensor will only see a packet once on any interface. However, if a Sensor is monitoring an interface containing VLAN-tagged traffic, a separate sub-interface must be configured for each VLAN to ensure a packet is not seen more than once. Note 3: Syn cookie feature is not supported on N-450 Sensor. Inbound Threshold Value Outbound Threshold Value Reset unfinished 3 way handshake connection The number of incomplete SYNs beyond which SYN cookies have to be enabled for an incoming connection. The number of incomplete SYNs beyond which SYN cookies have to be enabled for an outgoing connection. When enabled, Sensor automatically sends a TCP RST to the source when the TCP SYN timer has expired for a connection. Drop down choices: Disabled: turned off Set for all traffic: all attack types Set for DoS attack traffic only This action should only be performed by expert users with detailed knowledge of TCP, otherwise system errors could occur. For a description of TCP settings see McAfee Network Security Platform IPS Configuration Guide. Rate-Limiting Configurations To block threshold based DoS attacks, you can use Network Security Platform's rate-limiting feature. You can rate-limit by protocol such as P2P, HTTP and ICMP as by TCP ports, UDP ports, and IP Protocol Number. Rate-limiting is used to control the rate of egress (traffic going out) traffic sent through the ports of a Sensor. When deployed in inline mode, Sensor permits rate-limiting of traffic by limiting the bandwidth of the traffic that goes through the Sensor ports. Traffic that is less than or equal to the specified bandwidth value is allowed, whereas traffic that exceeds the bandwidth value is dropped. The Sensor uses the token bucket approach for rate-limiting traffic. McAfee Network Security Platform Denial-of-Service 39
40 6 Administration Walk-through Sensor-level options Network Security Platform provides rate-limiting configuration at individual sensor ports. For example, if 1A-1B is a port-pair, traffic management is configured separately for 1A and 1B. Traffic Management configuration for a port applies to egress traffic only. In the Manager, every rate-limiting queue of a Sensor is uniquely identified by a name. The traffic management queues are configured based on Protocol, TCP ports, UDP ports, and IP Protocol Number. You can create multiple queues for each port of the sensor. The traffic management configuration in the Manager must be followed by a configuration update to the sensor. Rate-limiting option is available as one of the traffic management options in the Manager. In order to set rate-limiting values you have to enable traffic management first. For more information on traffic management, see, McAfee Network Security PlatformIPS Configuration Guide. Enabling traffic management configurations on the Sensor Follow this procedure to enable traffic management on a Sensor: Task 1 From the resource tree, select <Admin Domain Name> / IPS Settings / <Sensor Name> Traffic Management Enable. The Enable page where you can edit the traffic management parameters displayed. Figure 6-13 Traffic management on a Sensor 2 To enable rate-limiting for all the inline ports of the selected Sensor, select Yes in the Enable Traffic Management Settings option. 3 Click Save to save the configuration changes. An Informational message indicating that you need to update the Sensor configuration to make traffic management changes effective is displayed. Figure 6-14 Success message 40 McAfee Network Security Platform Denial-of-Service
41 Administration Walk-through Sensor-level options 6 4 Click OK. 5 Update the Sensor's configuration (<Admin_Domain_Name> / IPS Settings / Device_Name Configuration Update >IPS Sensoror <Admin_Domain_Name / IPS Settings Configuration Update IPS Sensors) for the changes to be effective. The traffic management configuration tabs are provided for each inline port of the Sensor. Queue count Queue Count refers to the number of rate-limiting and other type of traffic management queues, configured for the Sensor port. This is displayed in the Enable page under the Traffic Management tab. Figure 6-15 Queue count The number of rate-limiting queues that can be configured on a port depends on the type of the port. An FE port supports a maximum of six queues and a GE port supports a maximum of eight queues. The maximum queue count does not depend on the Sensor model. For information on types of queues other than rate-limiting, see, McAfee Network Security PlatformIPS Configuration Guide. Adding a rate-limit bandwidth traffic management queue To add a Rate Limit Bandwidth queue for traffic management, do the following: McAfee Network Security Platform Denial-of-Service 41
42 6 Administration Walk-through Sensor-level options Task 1 From the resource tree, select <Admin Domain Name> / IPS Settings / <Sensor Name> Traffic Management Enable. The Enable page is where you can add a rate-limit bandwidth traffic management queue. Figure 6-16 Enabling traffic management 2 Check whether the Enable Traffic Management Settings option is enabled. 3 Select a port to add a rate-limiting queue. For example, select 1A. 4 Click New. The Add Queue page is displayed. Figure 6-17 Traffic management: Adding queue 42 McAfee Network Security Platform Denial-of-Service
43 Administration Walk-through Sensor-level options 6 5 In the Add Queue page, you can specify the following parameters, for configuring the required traffic management queue. Field Name Type Value Description This field represents the name of the traffic management queue. The queue name is unique within a Sensor port. Note that the same name can be used for two queues corresponding to different ports of the same Sensor. You can customize the name as required. Specifies the type of queue: Rate Limit Bandwidth, DiffServ, or VLAN 802.1p. Select Rate Limit Bandwidth. The value of Rate Limit Bandwidth. Select Kbps or Mbps from the drop down list and enter a value within the range indicated below the Value field. Available Protocols Selected Protocols TCP Port UDP Port IP Protocol Number The list of application protocols defined for traffic management within the Sensor. The protocols that you select to the traffic management queue, from the Available Protocols list. The TCP port used for traffic management. The UDP port used for traffic management. The IP protocol number. 1 Enter a Name for the new traffic management queue. 2 Select Rate Limit Bandwidth as the Typeof traffic management queue. 3 Select the Value. 4 From the Available Protocols list, select the Protocol. Click Add, to add the selected protocol to the Selected Protocols list. To remove a protocol from the Selected Protocols list, select it and click Remove. Within a rate-limiting queue, you can configure more than one protocol. 5 Specify a TCP Port. Enter the port number or port range (for example, 5-10) to add to the desired port list and click >>. Make changes, if necessary. To remove a port or port range from the selected ports list, make your selection and click <<. Select Any Port to select the entire port range ( ). 6 Specify a UDP port. Enter the port number or port range (for example, 5-10) to add to the desired port list and click >>. Make changes, if necessary. To remove a port or port range from the selected ports list, make your selection and click <<. Select Any Port to select the entire port range ( ). 7 Specify an IP protocol number. Enter the IP protocol number or protocol number range between to add to the desired port list and click >>. You cannot specify IP protocol numbers 6 (TCP) and 17 (UDP). McAfee Network Security Platform Denial-of-Service 43
44 6 Administration Walk-through Interface-level options Make changes, if necessary. To remove a port or port range from the selected port list, select it and click <<. 8 Click OK, to save the rate limiting-queue configuration. The new rate-limiting queue is displayed in the Enable page. 9 Click Save to save the new traffic management queue. 10 Push the configuration changes to the Sensor for the changes to be effective (<Admin_Domain_Name> / IPS Settings / Device_Name Configuration Update >IPS Sensoror <Admin_Domain_Name / IPS Settings Configuration Update IPS Sensors). For more information on updating Sensor configuration, see McAfee Network Security Platform Device Configuration Guide. To configure a sensor port for traffic management, the port must be in Inline mode. For more information on Traffic Management, see McAfee Network Security Platform IPS Configuration Guide. Interface-level options The user interface includes two pages of interface-level options: DoS policy DoS profile Customizing DoS policy at the interface level The DoS Policy page at the Sensor interface level lists the default DoS policy assigned to the interface. This policy is inherited from the higher level and hence is listed as Inherited DoS. Task 1 Click <Admin_Domain_Name> / IPS Settings / <Sensor_Name> / <Interface_Name> Scanning DoS Policy to view the DoS Policy page at the interface level. The DoS policy inherited from the higher level is listed by default. Figure 6-18 DoS policy 44 McAfee Network Security Platform Denial-of-Service
45 Administration Walk-through Interface-level options 6 2 Click Edit to view the Customize DoS Policy page. Figure 6-19 Customizing DoS policy 3 Select the attack that you want to customize and click View/Edit to view the Edit Attack Details page for the selected attack. Figure 6-20 View/Edit attacks 4 Customize the attack as per your requirements and clickok to return to the Customize DoS Policy page. Click Save. See, How Customization of Attack Response Works. McAfee Network Security Platform Denial-of-Service 45
46 6 Administration Walk-through Interface-level options 5 Enter a comment (optional) in the Enter Comment - (Policy Edit) page. Figure 6-21 Enter comment page 6 Click Commit to view the Informational notification on changes being successful. Figure 6-22 Success message 7 Click OK to return to the DoS Policy page where the DoS policy is listed as Customized DoS in parenthesis. Figure 6-23 Customized DoS policy You must update the Sensor configuration (<Admin_Domain_Name> / IPS Settings / Device_Name Configuration Update >IPS Sensor or <Admin_Domain_Name / IPS Settings Configuration Update IPS Sensors) for the configuration changes to take effect. See also DoS related actions using CLI Commands on page 4 46 McAfee Network Security Platform Denial-of-Service
47 Administration Walk-through Viewing DoS alerts in Threat Analyzer 6 View DoS profiles at the interface level At the interface level (<Admin Domain Name> / IPS Settings / <Sensor_Name> / <Interface_Name> Scanning DoS Profile), the DoS Profiles page displays a subset of the information found on the same page at the Sensor level. You can use this page to view the DoS profile associated with the interface. Figure 6-24 DoS profile Click View to view the DoS profile associated with the selected interface. Figure 6-25 View DoS profile Options at the sub-interface level are identical to those at the Interface level. Viewing DoS alerts in Threat Analyzer DoS related alerts are listed in the Alerts page of the Threat Analyzer. DoS related alerts are either alerts relating to threshold violations or statistical attacks. Simple Threshold alerts are those in violation of DoS Threshold Mode settings. Statistical attacks are those in violation of DoS Learning Mode settings. McAfee Network Security Platform Denial-of-Service 47
48 6 Administration Walk-through Viewing DoS alerts in Threat Analyzer Follow this procedure to view details of a specific alert: Task 1 Right-click an attack instance and click Show details. Figure 6-26 Threat Analyzer 48 McAfee Network Security Platform Denial-of-Service
49 Administration Walk-through Viewing DoS alerts in Threat Analyzer 6 2 The alert details for the selected alert is displayed Figure 6-27 Alerts The descriptions of attacks from DDoS attack tools in the Threat Analyzer of the Network Security Platform generally start with DDos and sort accordingly. The exceptions are the signatures that detect the communication between DDoS tools over specific application protocols, other than ICMP or arbitrary TCP/UDP ports. For example, IRC: Trinity DDoS identifies communication between Trinity hosts over IRC. Figure 6-28 All alerts Tasks Blocking attacks in the Threat Analyzer on page 51 Editing attack settings for a DoS alert in Threat Analyzer on page 52 McAfee Network Security Platform Denial-of-Service 49
50 6 Administration Walk-through Viewing DoS alerts in Threat Analyzer Alert Details The Alert Details page gives a clearer picture of the key information related to the attack. The information can then be used to augment your policy settings and/or to initiate a response action. Figure 6-29 Alert Details page The Alert Details page displays alert details that are specific to a type of attack. Hence, the information displayed varies from one type of attack to another. Some alert details relating to DoS attacks are as described below: Simple Threshold Alerts Simple Threshold alerts are those in violation of DoS Threshold Mode settings. Threshold ID: This ID corresponds to where this threshold attack is listed in the DoS Threshold Mode catalog. Observed Value: The number of times the instance occurred. Since an alert was sent, this value is larger than the Threshold Value. Threshold Duration: The time limit value set within DoS Threshold Mode customization for the attack instance. This compliments the Threshold Value. This duration is run to the end to capture all instances within the time limit rather than stopping after the first value over the threshold is detected. Threshold Value: The limit set within DoS Threshold Mode customization for the attack instance and compliments the Threshold Duration. Figure 6-30 Threshold Statistical Alerts 50 McAfee Network Security Platform Denial-of-Service
51 Administration Walk-through Viewing DoS alerts in Threat Analyzer 6 Statistical attacks are those in violation of DoS Learning Mode settings. Measures: Displays bar graphs with packet rate data relating to the violated Learning Mode measure. The violated measure(s) is displayed with the corresponding packet rate over the last 10 minutes. The graph displays the learned long-term rate (as established by the DoS profiling process) against recent activity, or short-term rate. The short-term rate is for the most recent 10 minutes (approximately). When the short-term rate is greater than the long-term rate and exceeds the specified response sensitivity (Low, Medium, or High - from DoS Learning Mode settings), an alert is generated. The Percentage value represents the percentage of all traffic for which the noted measure accounted. For example, if the "normal" percentage for IP fragments is approximately 2.5%, then IP fragments make up 2.5% of all traffic through the monitored segment. If the percentage of fragmented IP packets in the traffic during an interval was significantly higher than the established long-term percentage, it indicates an IP Fragment Flood attack. Packet Rate: Displays the violated measure's packet rate for the last minute when the alert was raised. Packet rates are shown in five (5) second intervals. DoS IP Range: Displays the ranges of IP addresses, both source and destination that were involved in the DoS attack. The packet type and total number of packets that were a part of the attack are also noted. Min[imum] refers to the first address in the range and Max[imum] refers to the last address in the range. Total Packet Count is the number of DoS packets seen from the given source and destination range. This includes both benign ("good") and attacking ("bad") packets. All packets of various packet types (such as TCP SYN) destined to the particular network are displayed in the alert. Figure 6-31 DoS IP range The first DoS alert shows packets counts received for 5 seconds before the alert. The subsequent suppressed alerts show the number of packets received since the last alert. If you choose to drop packets, the Sensor drops only the "bad" packets. Thus, the Sensor may not always drop packets from what is determined as a "good" source IP address. Blocking attacks in the Threat Analyzer All attacks (except ICMP Echo Anomaly and TCP Control Anomaly attacks) can be configured to be blocked from within the All Alerts page of the Threat Analyzer. Task 1 Right-click an attack instance and click Show details. The alert details for the selected alert are displayed. 2 Click Enable Blocking. McAfee Network Security Platform Denial-of-Service 51
52 6 Administration Walk-through Viewing DoS alerts in Threat Analyzer 3 Enter the required duration against Drop the DoS Packets for a duration of minutes field in the Block page. 4 Click Block. 5 Click Close to close the Blockpage. 6 Update the Sensor configuration to the Sensor in the Manager (<Admin_Domain_Name> / IPS Settings / Device_Name Configuration Update >IPS Sensoror <Admin_Domain_Name / IPS Settings Configuration Update IPS Sensors) for the blocking to take effect. Figure 6-32 Blocking attacks in the Threat Analyzer Sensors can only raise an alert in case of ICMP Echo Anomaly and TCP Control Anomaly attacks but cannot block them, even when in In-line mode. Editing attack settings for a DoS alert in Threat Analyzer You can edit attack settings for a DoS alert listed in the Threat Analyzer. Follow this procedure to edit attack settings for an attack in the Threat Analyzer: Task 1 Right-click an attack instance and click Show details. 2 The alert details for the selected alert are displayed. 3 Click Edit Attack Settings to view the choices. Figure 6-33 Show attack details 52 McAfee Network Security Platform Denial-of-Service
53 Administration Walk-through Viewing DoS alerts in Threat Analyzer 6 4 Click Current Policy Only to view the Edit Attack Detail page. Figure 6-34 Alert Details Click Edit Attack Settings Default Attack Settings to view the Edit Attack Details page and modify the Default Attack Settings. The modifications made using the Default Attack Settings option will apply to all the attacks with the same attack name. Editing an individual attack using the Current Policy Only option; however overrides the Default Attack Settings. 5 Edit the attack as required and click OK. 6 Update the Sensor configuration in the Manager (<Admin_Domain_Name> / IPS Settings / Device_Name Configuration Update >IPS Sensoror <Admin_Domain_Name / IPS Settings Configuration Update IPS Sensors) for the blocking to take effect. See How Customization of Attack Response Works for information on customizing an attack. See also DoS related actions using CLI Commands on page 4 McAfee Network Security Platform Denial-of-Service 53
54 6 Administration Walk-through Viewing DoS alerts in Threat Analyzer 54 McAfee Network Security Platform Denial-of-Service
55 7 DoS 7 related actions using CLI commands You can use Network Security Platform CLI commands in conjunction with the options available in the Manager to set DoS prevention severity, block DoS traffic and for DNS Spoof protection. set dospreventionseverity Block DoS traffic from a specific host DNS Spoof Protection The following CLI commands can be used to view information on profiles and severity: show dospreventionprofile Displays the specified denial of service profile information for the Network Security Sensor (Sensor), defined in two arguments a DoS measure name, and a traffic direction. show dospreventionseverity Displays the severity for a specified Denial of Service profile. Contents set dospreventionseverity Blocking DoS traffic from a specific host DNS spoof protection show dospreventionprofile DOS prevention severity for tcp-syn-ack outbound is 30 set dospreventionseverity This command, when executed, sets severity for the specified DoS measure. Increasing the DoS prevention severity increases the number of DoS packets dropped. The default value is 30. The largest value is 200, and the smallest is 0. Syntax: set dospreventionseverity <dos-measure-name> <inbound outbound> <0-200> Takes two arguments: A DoS measure name: one of 'tcp-syn', 'tcp-syn-ack', 'tcp-fin', 'tcp-rst', 'udp', 'icmp-echo', 'icmp-echo-reply', 'icmp-non-echo-reply', 'ip-fragment', and 'non-tcp-udp-icmp' A direction (one of 'inbound' or 'outbound') For example, set dospreventionseverity tcp-syn-ack outbound 100 McAfee Network Security Platform Denial-of-Service 55
56 7 DoS related actions using CLI commands Blocking DoS traffic from a specific host Blocking DoS traffic from a specific host Task 1 Keep the Sensor (inline) in learning mode for 48 hours so that normal traffic pattern is learnt. 2 Send some particular type of traffic from selected IP addresses through the Sensor during the learning mode (that is, for the first 48 hours). The Sensor automatically switches to detection mode after the first 48 hours. 3 Enable blocking for the corresponding attack in the DoS policy. 4 Set the maximum value on the Sensor using the CLI command: set dospreventionseverity<packet type> <direction> <value> 5 Send significantly more similar traffic from the selected IP address through the Sensor than what was sent during the learning mode. 6 This blocks the source IP address. Example Keep the Sensor in learning mode for 48 hours. Send 5 Mbps of UDP packet type to the Sensor from selected IP address such as, , , , and Switch the Sensor into detection mode Enable blocking for Inbound UDP Packet Volume Too High attack in the DoS policy. Send more than 50 Mbps traffic from This blocks the learnt IP address. DNS spoof protection DNS servers can be protected from DoS spoof attack by forcing the DNS clients to use TCP instead of UDP as their transport protocol. Since TCP uses three-way-handshake, it is comparatively tough to launch spoofed attacks when TCP is used. You can set the DNS protection mode, add to, or delete existing DNS Spoof protection IP addresses from the protected server list using CLI commands. set dnsprotect This command, when executed, sets the DNS protection mode. Syntax set dnsprotect <inbound/inbound-outbound/ip-based/off/outbound> Parameter <inbound> <inbound-outbound> <ip-based> Description sets the DNS protection mode to 'inbound' sets the DNS protection mode to 'inbound-outbound' sets the DNS protection mode to 'ip-based' 56 McAfee Network Security Platform Denial-of-Service
57 DoS related actions using CLI commands show dospreventionprofile 7 Parameter <off> <outbound> Description turns off the DNS protection mode sets the DNS protection mode to 'outbound' The list of protected destination IP addresses can be edited irrespective of this setting. dnsprotect This command, when executed, performs the following tasks, adds new DNS Spoof protection IP address, deletes existing DNS Spoof protection IP addresses (IPv4, IPv6 or both) from the Protected Server List (PSL), and relists the DNS spoofing protection IP address. Syntax: Use the following syntax for adding or deleting a DNS Spoof protection IP address dnsprotect <add/delete/> <ipv4/ipv6> <IP address> While using the <resetlist> parameter, use the following syntax: dnsprotect <resetlist> <ipv4/ipv6/all> Parameter Description add delete resetlist ipv4 ipv6 all Adds a new DNS spoofing protection IP address Deletes an existing DNS spoofing protection IP address Resets the list the DNS spoofing protection IP address Indicates that the IP address is for ipv4 packet Indicates that the IP address is for ipv6 packet Indicates that the resetlist of the existing DNS spoofing protection IP address is for both ipv4 and ipv6. Example: The following example shows the dnsprotect command used for adding the DNS Spoof protection IP address for ipv4. dnsprotect add ipv The following example shows the dnsprotect command used for reset listing of DNS Spoof protection IP address for all the IP addresses (ipv4 and ipv6). dnsprotect resetlist all This command does not perform on IPv6 packets that have a routing header. show dospreventionprofile This command, when executed, displays the specified denial of service prevention profile information for the Sensor, defined in two arguments a DoS measure name, and a traffic direction. Syntax: show dospreventionprofile <dos-measure-name> <inbound outbound> McAfee Network Security Platform Denial-of-Service 57
58 7 DoS related actions using CLI commands DOS prevention severity for tcp-syn-ack outbound is 30 Parameter Description <dos-measure-name> indicates the DoS measure name: one of 'tcp-syn', 'tcp-syn-ack', 'tcp-fin', 'tcp-rst', 'udp', 'icmp-echo', 'icmp-echo-reply', 'icmp-non-echo-reply', 'ip-fragment', or 'non-tcp-udp-icmp' <direction> indicates the direction. It can be 'inbound' or 'outbound' Example - Command execution: show dospreventionprofile tcp-syn inbound Information displayed by the show dospreventionprofile command includes the Sensor's dos profile and the traffic direction protected by the profile. Example - Result: packet type: TCP-SYN IN (0), profile stage: still learning (0) long-term average rate=0.000(pkts/s), last_rate=0.000(pkts/s) no attack in progress each line: bin_index, IP_prefix/prefix_len, AS, LT, ST, ltr(ate), str(ate) AS(%) -- percentage of the IP address space this bin occupies LT(%) -- percentage of long-term traffic that falls into this bin ST(%) -- percentage of short-term traffic that falls into this bin ltrate -- long-term average traffic rate (in pkts/s) for this bin strate -- short-term traffic rate (in pkts/s) for this bin 0: /2 AS=25.000% LT=25.000% ST=25.00% ltr=0.000 str= : /2 AS=25.000% LT=25.000% ST=25.00% ltr=0.000 str= : /2 AS=25.000% LT=25.000% ST=25.00% ltr=0.000 str= : /2 AS=25.000% LT=25.000% ST=25.00% ltr=0.000 str=0.000 DOS prevention severity for tcp-syn-ack outbound is 30 This command, when executed, displays the severity for a specified denial of service profile. Syntax: show dospreventionseverity<dos-measure-name><inbound outbound> Parameter Description <dos-measure-name> indicates the DoS measure name: one of 'tcp-syn', 'tcp-syn-ack', 'tcp-fin', 'tcp-rst', 'udp', 'icmp-echo', 'icmp-echo-reply', 'icmp-non-echo-reply', 'ip-fragment', or 'non-tcp-udp-icmp' <direction> indicates the direction. It can be 'inbound' or 'outbound' Example - Command execution: show dospreventionseverity tcp-syn-ack outbound 58 McAfee Network Security Platform Denial-of-Service
59 DoS related actions using CLI commands DOS prevention severity for tcp-syn-ack outbound is 30 7 Example - Result: DOS Prevention Severity for tcp-syn-ack outbound is 30 McAfee Network Security Platform Denial-of-Service 59
60 7 DoS related actions using CLI commands DOS prevention severity for tcp-syn-ack outbound is McAfee Network Security Platform Denial-of-Service
61 8 8 Configuring ACLs You can also use ACLs to prevent DoS attacks (<Admin_Domain_Name> / IPS Settings / <Sensor_Name> ACL ACL Assignments). ACLs can be created for a combination of any source IP addresses, destination IP addresses, specified CIDR blocks, destination protocol/port, by TCP/UDP port, by ICMP type, and by IP protocol for the Sensor as a whole and per individual port pair. Permit, Drop or Deny response action can be set while enabling intrusion prevention matching a configured rule. For information on how to create ACLs see McAfee Network Security Platform IPS Configuration Guide. McAfee Network Security Platform Denial-of-Service 61
62 8 Configuring ACLs 62 McAfee Network Security Platform Denial-of-Service
63 9 DoS related actions using CLI Commands How Customization of Attack Response Works You can customize the response options for the attacks listed in the Policy Editor at various levels of Network Security Manager. Customization here refers to enabling or disabling a given setting configured at the higher level and thereby exercising the option to inherit, or not inherit, the settings at the higher level. The approach is to allow a User with IPS Administrator or NTBA Administrator role privileges to customize each aspect of the attack definition in every IPS or NTBA policy, or leave it to inheritance to dictate what is enabled or disabled. Inheritance depends on where you are. Individual policies get their settings from the global policy, which is set on the Default IPS Attack Settings page for IPS, and Default NTBA Attack Settings page for NTBA (Default IPS Attack Settings page was referred to as the Global Attack Response Editor - GARE in Manager version 5.1 or earlier), unless explicitly set within the policy. The global policy, in turn, gets its settings from the Network Security Platform signature sets, unless explicitly set on the Default IPSor NTBA Attack Settings page. You can assume the following hierarchy for understanding inheritance: Level Description 1 Network Security Platform signature sets 2 Editor on the Default IPSorNTBA Attack Settings page 3 Editors on the IPS Policies, Reconnaissance Policies, NTBA Policies, and Worm Policies pages. McAfee Network Security Platform Denial-of-Service 63
64 9 DoS related actions using CLI Commands The operational aspect of customization is illustrated in the following example. Here attack response has been customized on the Edit Attack Details page for a DoS attack at the IPS interface level: Figure 9-1 Learning attack details In the settings above: 1 Severity is being inherited. 2 The User has explicitly customized (and enabled) alert generation, if not; its state would be inherited. 3 The specific notification options are being inherited and are currently disabled. 4 The blocking action is being inherited as well and is currently disabled. The following meanings and prerequisites apply in the context of enabling alerts in the Edit Alert Details page: Enable Alert means send an alert from the Sensor or Network Threat Behavior Analysis Appliance to the Manager. Enabling , Script, Pager, SNMP and Syslog at the Alert Notification tab at the Admin Domain level (<Admin_Domain_Name> / IPS Settings > Alert Notificationor<Admin_Domain_Name> / NTBA Settings > Alert Notification) is a prerequisite for forwarding these notifications. Another prerequisite that is specific to forwarding is to configure the server settings at the Sensor level (<Root_Admin_Domain> / Manager > Manager > Server). The Edit Attack Details pages for Exploit Attacks, Reconnaissance Attacks, NTBA Attacks, and DoS Threshold attacks contain options that are slightly different from the ones illustrated; however, the rules of customization described here apply to those attacks as well. 64 McAfee Network Security Platform Denial-of-Service
65 Index A ACL 61 Alert details 5, 50 Alerts 19 Attack settings in the Threat Analyzer 52 Attacks handling 17 B Blocking 21, 27, 31 Blocking in the Threat Analyzer 51 C Categorical anomalies 19 conventions and icons used in this guide 5 Customize attack response 63 D DDoS attack tools 11 dnsprotect 56 documentation audience for this guide 5 product-specific, finding 6 typographical conventions and icons 5 DoS alerts 9, 47 DoS detection signatures 14 DoS filters 36 DoS learning mode 29 DoS profile limits 35 DoS profiles 33 DoS related CLI commands 55 dospreventionprofile 57, 58 dospreventionseverity 55 E Edit policy 23 F Flows 14 H Handling DDoS attack tools 18 Handling volume based DoS 17 Handling vulnerability based DoS 18 I Interface level 44, 47 L Learning 16 M Manage DoS data 32 McAfee ServicePortal, accessing 6 Methods for countering DoS 13 P Packet search 15 Percentiles 20 Profile contamination 16 protocol parsing 14 Q Queue count 41 R Rate limiting 39 Response sensitivity 23 S ServicePortal, finding product documentation 6 Set response sensitivity 24 Set thresholds 27 Signatures 15 Source IP 16, 56, 57 T TCP settings 37, 44 Technical Support, finding product information 6 Threshold 15 Traffic 23, 27 Traffic management 40 V Volume anomalies 20 McAfee Network Security Platform Denial-of-Service 65
66 Index Vulnerability based DoS McAfee Network Security Platform Denial-of-Service
67
Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
McAfee Network Security Platform [formerly IntruShield] Denial-of-Service [DoS] Prevention Techniques Revision C Revised on: 18-December-2013
McAfee [formerly IntruShield] Denial-of-Service [DoS] Prevention Techniques Revision C Revised on: 18-December-2013 2 Contents 1. Overview...4 2. Types of DoS/DDoS Attacks...4 2.1. Volume-based DoS attacks...5
Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software
Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Network Threat Behavior Analysis Monitoring Guide. McAfee Network Security Platform 6.1
Network Threat Behavior Analysis Monitoring Guide McAfee Network Security Platform 6.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
epolicy Orchestrator Log Files
Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
McAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
McAfee Email Gateway 7.x Encryption and IronPort Integration Guide
Sample deployment architecture For this guide, we have provided a deployment architecture example. This example includes an IronPort Email Gateway sending outbound email, and the McAfee Email Gateway Encryption
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
Desktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
McAfee Risk Advisor 2.7
Getting Started Guide McAfee Risk Advisor 2.7 For use with epolicy Orchestrator 4.5 and 4.6 1 McAfee Risk Advisor 2.7 Getting Started Guide About this guide COPYRIGHT Copyright 2012 McAfee, Inc. All Rights
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software
Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
McAfee epolicy Orchestrator 4.5 Cluster Installation Guide
McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0
Product Guide McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
NSP DoS Prevention Techniques Revision D. McAfee Network Security Platform
NSP DoS Prevention Techniques Revision D McAfee Network Security Platform COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service
Application Note Configuring McAfee Firewall Enterprise for McAfee Web Protection Service This document explains how to configure McAfee Firewall Enterprise (Sidewinder ) to redirect all web traffic to
McAfee Optimized Virtual Environments for Servers. Installation Guide
McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Release Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
Data Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
McAfee Solidcore Change Reconciliation and Ticket-based Enforcement
Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
McAfee SiteAdvisor Enterprise 3.5.0
Product Guide Revision McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Recommended Recommended for all environments. Apply this update at the earliest convenience.
Release Notes McAfee Enterprise Mobility Management 11.0 Patch 4 About this document About this release Bug fixes and enhancement Installation instructions Files affected by patch Troubleshooting installation
McAfee Asset Manager Console
Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
Data Center Connector 3.0.0 for OpenStack
Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices
McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
McAfee VirusScan Enterprise 8.8 software Product Guide
McAfee VirusScan Enterprise 8.8 software Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Installation Guide. McAfee epolicy Orchestrator 4.6.0 Software
Installation Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
10 Configuring Packet Filtering and Routing Rules
Blind Folio 10:1 10 Configuring Packet Filtering and Routing Rules CERTIFICATION OBJECTIVES 10.01 Understanding Packet Filtering and Routing 10.02 Creating and Managing Packet Filtering 10.03 Configuring
System Status Monitoring Guide. McAfee Network Security Platform 6.1
System Status Monitoring Guide McAfee Network Security Platform 6.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals
Denial of Service Attacks Notes derived from Michael R. Grimaila s originals Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident
McAfee Agent Handler
McAfee Agent Handler COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Installation Guide. McAfee Security for Microsoft Exchange 7.6.0 Software
Installation Guide McAfee Security for Microsoft Exchange 7.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Gaurav Gupta CMSC 681
Gaurav Gupta CMSC 681 Abstract A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing Denial of Service for users of the
Product Guide. McAfee SaaS Endpoint Protection 5.2.0
Product Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
McAfee epolicy Orchestrator
Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
Managing Latency in IPS Networks
Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended
Product Guide. McAfee epolicy Orchestrator 4.6.0 Software
Product Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Modern Denial of Service Protection
Modern Denial of Service Protection What is a Denial of Service Attack? A Denial of Service (DoS) attack is generally defined as a network-based attack that disables one or more resources, such as a network
Implementing McAfee Device Control Security
Implementing McAfee Device Control Security COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0
Best Practices Guide McAfee Endpoint Protection for Mac 1.1.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
McAfee Directory Services Connector extension
Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
McAfee SaaS Email Archiving
User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Denial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
McAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
McAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
Deciphering Detection Techniques: Part III Denial of Service Detection
Deciphering Detection Techniques: Part III Denial of Service Detection By Dr. Fengmin Gong, Chief Scientist, McAfee Network Security Technologies Group January 2003 networkassociates.com Table of Contents
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Release Notes for McAfee VirusScan Enterprise for Storage 1.0
Release Notes for McAfee VirusScan Enterprise for Storage 1.0 About this document New features Known issues Where to find McAfee enterprise product information License attributions About this document
Total Protection Service
User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010
Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
Installation Guide. McAfee SaaS Endpoint Protection 5.2.0
Installation Guide McAfee SaaS Endpoint Protection 5.2.0 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
Installation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
McAfee Total Protection Service Installation Guide
McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Fifty Critical Alerts for Monitoring Windows Servers Best practices
Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering The ProSafe VPN Firewall 50 provides you with Web content filtering options such as Block Sites and Keyword Blocking. Parents and network administrators
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Brocade NetIron Denial of Service Prevention
White Paper Brocade NetIron Denial of Service Prevention This white paper documents the best practices for Denial of Service Attack Prevention on Brocade NetIron platforms. Table of Contents Brocade NetIron
V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks
Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against
TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS
TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor
