[189978] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Detecting Attacks

daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Sat Jun 11 13:42:36 2016

X-Original-To: nanog@nanog.org
From: Suresh Ramasubramanian <ops.lists@gmail.com>
In-Reply-To: <CAD=4tqQ4NLX3Adu_ZppJ_9di6YM=5SxYkCeVuXqo70epYeHG3w@mail.gmail.com>
Date: Sat, 11 Jun 2016 23:12:29 +0530
To: subashini hariharan <suba.h17@gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

Is your aim to generate attack traffic?  Or rather a mix of normal and attac=
k traffic. That's one part.   Googling ddos simulator will get you lots of r=
esults you can evaluate

Logging it appropriately and capturing the logs, storing them in a db is the=
 next.

--srs

> On 11-Jun-2016, at 10:52 AM, subashini hariharan <suba.h17@gmail.com> wrot=
e:
>=20
> Hello,
>=20
> I am Subashini, a graduate student. I am interested in doing my project in=

> Network Security. I have a doubt related to it.
>=20
> The aim is to detect DoS/DDoS attacks using the application. I am going to=

> use ELK (ElasticSearch, Logstash, Kibanna) for processing the logs (Log
> Analytics).
>=20
> My doubt is regarding how do we generate logs for detecting this attack? A=
s
> I am new to this process, I am not sure about it.
>=20
> Also, if it is possible to do any other attacks similar to this, you can
> please give a hint about it.
>=20
> Could anyone please help with this, it would be a great help!!
>=20
>=20
> --=20
> Thank You.
>=20
> With Regards,
> H.Subashini

home help back first fref pref prev next nref lref last post