[189978] in North American Network Operators' Group
Re: Detecting Attacks
daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Sat Jun 11 13:42:36 2016
X-Original-To: nanog@nanog.org
From: Suresh Ramasubramanian <ops.lists@gmail.com>
In-Reply-To: <CAD=4tqQ4NLX3Adu_ZppJ_9di6YM=5SxYkCeVuXqo70epYeHG3w@mail.gmail.com>
Date: Sat, 11 Jun 2016 23:12:29 +0530
To: subashini hariharan <suba.h17@gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
Is your aim to generate attack traffic? Or rather a mix of normal and attac=
k traffic. That's one part. Googling ddos simulator will get you lots of r=
esults you can evaluate
Logging it appropriately and capturing the logs, storing them in a db is the=
next.
--srs
> On 11-Jun-2016, at 10:52 AM, subashini hariharan <suba.h17@gmail.com> wrot=
e:
>=20
> Hello,
>=20
> I am Subashini, a graduate student. I am interested in doing my project in=
> Network Security. I have a doubt related to it.
>=20
> The aim is to detect DoS/DDoS attacks using the application. I am going to=
> use ELK (ElasticSearch, Logstash, Kibanna) for processing the logs (Log
> Analytics).
>=20
> My doubt is regarding how do we generate logs for detecting this attack? A=
s
> I am new to this process, I am not sure about it.
>=20
> Also, if it is possible to do any other attacks similar to this, you can
> please give a hint about it.
>=20
> Could anyone please help with this, it would be a great help!!
>=20
>=20
> --=20
> Thank You.
>=20
> With Regards,
> H.Subashini