TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------

Hi James,

According to your mail, do you mean that we can filter
any security events by source or destination address ?

If true, how can I do it ?

thks,

raymond

--- "Lindley, Jim (ISSAtlanta)" <[EMAIL PROTECTED]>
wrote:
> 
> TO UNSUBSCRIBE: email "unsubscribe issforum" in the
> body of your message to
> [EMAIL PROTECTED]  Contact [EMAIL PROTECTED]
> for help with any problems!
>
----------------------------------------------------------------------------
> 
> Steve:
> 
> I believe that your explanation of the SYNFLOOD
> parameters is at variance
> with the descriptions in the event's Advanced
> options.  The HIGHWATERMARK is
> the total number of unrequited SYN-ACKs waiting in
> the collection buffer on
> any single IP Socket.  This tracks a SYNFLOOD
> against single CPUs and
> services.  The second parameter, the DELTA, tracks
> the TOTAL number of
> unrequited SYN-ACKs on the network segment.  As I
> undertand this, The
> SYNFLOOD triggers if EITHER threshold is exceeded.
> 
> As for limiting the logging or display of
> uneccesarily repetitive
> information, that may be done through setting the
> Event Propagation and
> Event Filtering options on the same Advanced
> property sheet.  Users may
> define events in terms of any combination of source
> and destination address
> or port and may further eliminate redundant
> notifications/logging/etc. by
> manipulating event thresholds and intervals.
> 
> To find out even more, come to one of my classes!
> 
> James R Lindley
> Senior Security Instructor
> Internet Security Systems Inc
> 678-443-6323
> An unquenchable thirst for Pierian water.
>
****************************************************************************
> *******
>                            ISS CONNECT 2000
>   International User Group and Information Security
> Summit
> 
>            March 19-24, 2000                        
>  http://connect.iss.net
> 
>                                       REGISTER
> TODAY!
>
****************************************************************************
> *******
> -----Original Message-----
> From: Reddock, Steve (ISSTokyo)
> [mailto:[EMAIL PROTECTED]]
> Sent: Sunday, March 12, 2000 11:22 PM
> To: [EMAIL PROTECTED]
> Subject: Re: SynFloods
> 
> 
> 
> TO UNSUBSCRIBE: email "unsubscribe issforum" in the
> body of your message to
> [EMAIL PROTECTED]  Contact [EMAIL PROTECTED]
> for help with any
> problems!
>
----------------------------------------------------------------------------
> 
> Hi,
> 
> When RealSecure detects a synflood it puts the
> source address as 0.0.0.0 to 
> avoid flooding the console (and the user!). A real
> synflood attack will 
> almost certainly come from a spoofed source and
> quite possibly from a large 
> number of spoofed sources. If each one of these IPs
> was displayed in the 
> console as a separate souce address you would get
> swamped.
> 
> So they all get listed as 0.0.0.0. If you drill down
> on the event or use 
> the event inspector the source IP is listed in the
> info field, just incase 
> it's useful.
> 
> The way we detect synfloods is not perfect.
> Basically we count the number 
> of half open connections to each IP address. When
> you hit the magic number 
> we detect a synflood.
> 
> So imagine RS sitting infront of your firewall. All
> 2,000 users on your 
> network are emailing and surfing like mad. RS needs
> to keep track of all 
> 2000 ips for outgoing traffic and all the incoming
> stuff too. This is not 
> that easy.
> 
> A real Syn-flood will be a few thousand half open
> connections. If 
> RealSecure was to try to keep track of up to 3,000
> half open connections on 
> a few thousand machines it would very quickly run
> out of resources. So we 
> call a synflood at much less that a few thousand
> half open connections. The 
> default is in fact 40.
> 
> As you have seen, some networks are busier and can
> run to more than 40 half 
> open connections in regular use. When this happens
> you will see a synflood 
> false positive. To change the high water mark open
> your policy editor and 
> select the synflood decode. Click the advanced tab.
> There are two numbers 
> there. The high water mark is how many half open
> connections are allowed 
> before we trigger. You can usually take this to 150
> without problems. I've 
> seen people run at several hundred without problems.
> If you do increase 
> this number by much take a look at the readme. There
> is a section on how to 
> determine how much memory the detector requires. A
> sniffer could be used to 
> help determine the average number of half open
> connections, but may 
> customers just increase bit by bit until it seems
> right.
> 
> The second parameter to can adjust is the delta. The
> default is 500. This 
> means that once we trigger a syn-flood we wait for
> another 500 half open 
> connections before we tell you again. So in a real
> syn-flood of several 
> thousand events you will actually be told of several
> syn-floods in the 
> space of a minute or two. If there is only one
> syn-flood logged it's 
> probably a false positive and maybe increasing the
> high water mark is
> required.
> 
> If you have RealSecure Network Engine protecting a
> busy web server I would 
> expect 40 to be too low and you will get false
> positives. This does not 
> mean the engine can't keep up, it's just that there
> are a lot of 
> connections at that time, as it the nature of http
> traffic.
> 
> Of course it's a really good idea to patch those
> webservers against 
> syn-flood and every other DOS attack.
> 
> Cheers, Steve
> 
> At 11:03 AM 09-03-00 , Matthew F. Caldwell wrote:
> 
> >TO UNSUBSCRIBE: email "unsubscribe issforum" in the
> body of your message to
> >[EMAIL PROTECTED]  Contact [EMAIL PROTECTED]
> for help with any
> problems!
>
>---------------------------------------------------------------------------
> -
> >
> >
> >
> >If your using Solaris Engines, try using tcpdump or
> snoop to look at the
> >SYN packets further. On Windows NT try windump.
> This will give you a
> >better understanding of the packets and what is
> causing the SYN signature
> >to appear. I've seen the synflood signature appear
> often in cases where
> >the engines can't keep up with the bandwidth. (Most
> often high traffic
> >websites)
> 
>
----------------------------------------------------------------------------
> Steve Reddock
> Consulting Manager - Asia Region
> [EMAIL PROTECTED]
> 
> Internet Security Systems KK, Japan
> Phone +81-3-5475-6458      Fax +81-3-5475-0557
> http://www.iss.net                
> http://www.isskk.co.jp
> 
> Adaptive Network Security for the Enterprise
> 
=== message truncated ===

__________________________________________________
Do You Yahoo!?
Talk to your friends online with Yahoo! Messenger.
http://im.yahoo.com

Reply via email to