Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 77
  • Last Modified:

DDOS attack

Hi all

The internet connectivity on my network has recently been disrupted by a DDOS attack.  My firewall logs UDP floods coming to our IP address that faces the world when we are on the net.  This then causes our internet to fail completely.  I work at a school where a lot of the students have their own devices.  Im pretty sure that the attack is being initiated from within our network maybe using a program or proxy of some sort that comes back and floods that IP from a number of different IPs.

What I want is to monitor is the network programs that are being run on devices connected to our network.  I was thinking that I could use wireshark on the network to capture all of the traffic during an attack.  What I dont know is what kinds of traffic to filter for withing wireshark.  We have spanning tree enabled on the network devices so wireshark should work just fine.

Any suggestions would be appreciated
0
gilmanschool
Asked:
gilmanschool
2 Solutions
 
Ken BooneNetwork ConsultantCommented:
If you are experiencing a DDOS attack coming from the outside then you might be able to figure it out.  Wireshark is going to give you so much data and its not the best at collaborating the data for this.   If you have netflow on your internet router or firewall you can pull down a program like scrutinizer and it will show you graphically who is attacking and on what ports.  You can then call your isp and see if they can filter this out on their end to free up your circuit.
0
 
madunixChief Information Security Officer Commented:
Check http://hakin9.org/is-ddos-still-a-threat/
I think it's wise to look at dedicated appliances such as cisco fortinet or juniper which are made to detect and defend. Try with http://www.fortinet.com/products/fortiddos/index.html
0

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now