netflow,抓包

源代码在线查看: flow-dscan.html

软件大小: 946 K
上传用户: jackjinke
关键词: netflow
下载地址: 免注册下载 普通下载 VIP

相关代码

								>				>				>flow-dscan				>				NAME="GENERATOR"				CONTENT="Modular DocBook HTML Stylesheet Version 1.71				">				>				CLASS="REFENTRY"				BGCOLOR="#FFFFFF"				TEXT="#000000"				LINK="#0000FF"				VLINK="#840084"				ALINK="#0000FF"				>				>				NAME="AEN1"				>				CLASS="APPLICATION"				>flow-dscan				>				>				>				CLASS="REFNAMEDIV"				>				NAME="AEN6"				>				>				>Name				>				CLASS="APPLICATION"				>flow-dscan				> -- Detect scanning and other suspicious network activity.				>				CLASS="REFSYNOPSISDIV"				>				NAME="AEN10"				>				>				>Synopsis				>				>				CLASS="COMMAND"				>flow-dscan				>  [-bBhlmpwW] [-d				CLASS="REPLACEABLE"				>				> debug_level				>				>] [-D				CLASS="REPLACEABLE"				>				> iplist_depth				>				>] [-s				CLASS="REPLACEABLE"				>				> state_file				>				>] [-i				CLASS="REPLACEABLE"				>				> input_filter				>				>] [-L				CLASS="REPLACEABLE"				>				> suppress_list				>				>] [-o				CLASS="REPLACEABLE"				>				> output_filter				>				>] [-O				CLASS="REPLACEABLE"				>				> excessive_octets				>				>] [-P				CLASS="REPLACEABLE"				>				> excessive_flows				>				>] [-S				CLASS="REPLACEABLE"				>				> port_scan_trigger				>				>] [-t				CLASS="REPLACEABLE"				>				> ager_timeout				>				>]				>				>				CLASS="REFSECT1"				>				NAME="AEN34"				>				>				>DESCRIPTION				>				>The 				CLASS="COMMAND"				>flow-dscan				> utility is used to detect suspicious				activity such as port scanning, host scanning, and flows with 				unusually high octets or packets.  A source and destination suppress				list is supported to help prevent false alarms due to hosts such as				nameservers or popular web servers that exchange traffic with a large				number of hosts.  Alarms are logged to syslog or stderr.  The internal				state of flow-dscan can be saved and loaded to allow for interrupted operation.				>				>				CLASS="COMMAND"				>flow-dscan				> will work best if configured to only watch only inbound or outbound				traffic by using the input or output interface filter option.				>				>The host scanner works by counting the length of the destination IP				hash chain.  If it goes above 64, then the src is considered to				be scanning.				>				>The port scanner works by keeping a bitmap of the destination port				number < 1024 per destination IP.  If it goes above 64, the src is				considered to be port scanning the destination.				>				>When a src has been flagged as scanning it will not be reported again				until the record is aged out and enough flows trigger it again.				>				>A SIGHUP signal will instruct flow-dscan to reload the suppress list.				>				>A SIGUSR1 signal will instruct flow-dscan to dump its internal state.				>				>				CLASS="REFSECT1"				>				NAME="AEN45"				>				>				>OPTIONS				>				>				>				CLASS="VARIABLELIST"				>				>				>-b				>				>				>Do not detach and run in the background.  Alerts go to stderr.				>				>				>-B				>				>				>Do not detach and run in the background.  Alerts go to syslog.				>				>				>-d				CLASS="REPLACEABLE"				>				> debug_level				>				>				>				>				>Enable debugging.				>				>				>-D				CLASS="REPLACEABLE"				>				> iplist_depth				>				>				>				>				>Depth of IP host list for detecting host scanning.				>				>				>-h				>				>				>Display help.				>				>				>-i				CLASS="REPLACEABLE"				>				> input_filter				>				>				>				>				>Input interface filter list.				>				>				>-I				CLASS="REPLACEABLE"				>				> output_filter				>				>				>				>				>Output interface filter list.				>				>				>-l				>				>				>Load state from 				CLASS="FILENAME"				>/var/tmp/dscan.state				> or the filename				specified with -s.				>				>				>-L				CLASS="REPLACEABLE"				>				> suppress_list				>				>				>				>				>Basename of suppress files.  There are two suppress files for input and				output traffic.  The suppress file syntax is				>				>IP_address protocol source_port destination_port				>				>A '-' can be used as a wildcard in the protocol, source_port,				and destination_port fields.  Only a single protocol, source_port, and				destination_port is supported per IP address.				>				>				>-m				>				>				>Multicast address filter.  Use to ignore multicast addresses.				>				>				>-O				CLASS="REPLACEABLE"				>				> excessive_octets				>				>				>				>				>Trigger an alert if a flow is processed with the octets field exceeding								CLASS="REPLACEABLE"				>				>excessive_octets				>				>.				>				>				>-p				>				>				>Dump state to 				CLASS="FILENAME"				>/var/tmp/dscan.state				> or the filename				specified with -s.				>				>				>-P				CLASS="REPLACEABLE"				>				> excessive_packets				>				>				>				>				>Trigger an alert if a flow is processed with the packets field exceeding								CLASS="REPLACEABLE"				>				>excessive_packets				>				>.				>				>				>-s				CLASS="REPLACEABLE"				>				> statefile				>				>				>				>				>State filename.  Defaults to 				CLASS="FILENAME"				>/var/tmp/dscan.state				>				>				>				>-S				CLASS="REPLACEABLE"				>				> port_scan_trigger				>				>				>				>				>Number of ports a IP address must have used to be considered scanning.				>				>				>-t				CLASS="REPLACEABLE"				>				> ager_timeout				>				>				>				>				>How long to keep flows around.  Default to 90000.  This is measured in				flows processed.				>				>				>-T				CLASS="REPLACEABLE"				>				> excessive_time				>				>				>				>				>Trigger an alert if a flow is processed with the End-Start field exceeding								CLASS="REPLACEABLE"				>				>excessive_time				>				>.				>				>				>-w				>				>				>Filter (ignore) candidate inbound www traffic, ie IP protocol 6, source port				80, and destination port > 1023.				>				>				>-W				>				>				>Filter (ignore) candidate outbound www traffic, ie IP protocol 6, destination				port 80, and source  port > 1023.				>				>				>				>				>				CLASS="REFSECT1"				>				NAME="AEN143"				>				>				>EXAMPLES				>				CLASS="INFORMALEXAMPLE"				>				NAME="AEN145"				>				>				>				>				>In a topology where 25 is the only output interface run flow-dscan over				the data in 				CLASS="FILENAME"				>/flows/krc4				>.  Ignore www and multicast				traffic, store the internal state in								CLASS="FILENAME"				>dscan.statefile				> on exit.  Use empty suppress list				files 				CLASS="FILENAME"				>dscan.suppress.src				> and								CLASS="FILENAME"				>dscan.suppress.dst				>.  The output produced by flow-dscan				typically must be manually inspected by using flow-filter and flow-print.				Many of the alerts will be false until the suppress lists are populated				for the local environment.				>				>  				CLASS="COMMAND"				>flow-cat /flows/krc4 | flow-dscan -I25 -b -m -s dscan.statefile -p -W				>				>				>				>				>				>				CLASS="REFSECT1"				>				NAME="AEN153"				>				>				>BUGS				>				>The ager should automatically become more aggressive when a low memory				condition exists.								There is no upper limit on the number of records that can be allocated.  If				the ager is not running often enough the host will be run out of memory.				>				>				CLASS="REFSECT1"				>				NAME="AEN156"				>				>				>AUTHOR				>				>Mark Fullmer								CLASS="EMAIL"				><				HREF="mailto:maf@splintered.net"				>maf@splintered.net				>>				>				>				>				CLASS="REFSECT1"				>				NAME="AEN163"				>				>				>SEE ALSO				>				>				CLASS="APPLICATION"				>flow-tools				>(1)				>				>				>				>			

相关资源