Solved

DDOS attack

Posted on 2014-03-04
4
60 Views
Last Modified: 2016-01-02
Hi all

The internet connectivity on my network has recently been disrupted by a DDOS attack.  My firewall logs UDP floods coming to our IP address that faces the world when we are on the net.  This then causes our internet to fail completely.  I work at a school where a lot of the students have their own devices.  Im pretty sure that the attack is being initiated from within our network maybe using a program or proxy of some sort that comes back and floods that IP from a number of different IPs.

What I want is to monitor is the network programs that are being run on devices connected to our network.  I was thinking that I could use wireshark on the network to capture all of the traffic during an attack.  What I dont know is what kinds of traffic to filter for withing wireshark.  We have spanning tree enabled on the network devices so wireshark should work just fine.

Any suggestions would be appreciated
0
Comment
Question by:gilmanschool
4 Comments
 
LVL 24

Accepted Solution

by:
Ken Boone earned 200 total points
ID: 39904313
If you are experiencing a DDOS attack coming from the outside then you might be able to figure it out.  Wireshark is going to give you so much data and its not the best at collaborating the data for this.   If you have netflow on your internet router or firewall you can pull down a program like scrutinizer and it will show you graphically who is attacking and on what ports.  You can then call your isp and see if they can filter this out on their end to free up your circuit.
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 200 total points
ID: 40072938
Check http://hakin9.org/is-ddos-still-a-threat/
I think it's wise to look at dedicated appliances such as cisco fortinet or juniper which are made to detect and defend. Try with http://www.fortinet.com/products/fortiddos/index.html
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question