Solved

DDOS attack

Posted on 2014-03-04
4
58 Views
Last Modified: 2016-01-02
Hi all

The internet connectivity on my network has recently been disrupted by a DDOS attack.  My firewall logs UDP floods coming to our IP address that faces the world when we are on the net.  This then causes our internet to fail completely.  I work at a school where a lot of the students have their own devices.  Im pretty sure that the attack is being initiated from within our network maybe using a program or proxy of some sort that comes back and floods that IP from a number of different IPs.

What I want is to monitor is the network programs that are being run on devices connected to our network.  I was thinking that I could use wireshark on the network to capture all of the traffic during an attack.  What I dont know is what kinds of traffic to filter for withing wireshark.  We have spanning tree enabled on the network devices so wireshark should work just fine.

Any suggestions would be appreciated
0
Comment
Question by:gilmanschool
4 Comments
 
LVL 24

Accepted Solution

by:
Ken Boone earned 200 total points
ID: 39904313
If you are experiencing a DDOS attack coming from the outside then you might be able to figure it out.  Wireshark is going to give you so much data and its not the best at collaborating the data for this.   If you have netflow on your internet router or firewall you can pull down a program like scrutinizer and it will show you graphically who is attacking and on what ports.  You can then call your isp and see if they can filter this out on their end to free up your circuit.
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 200 total points
ID: 40072938
Check http://hakin9.org/is-ddos-still-a-threat/
I think it's wise to look at dedicated appliances such as cisco fortinet or juniper which are made to detect and defend. Try with http://www.fortinet.com/products/fortiddos/index.html
0

Featured Post

Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now