You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have im seeing some "false positive" DDoS alerts, aparently caused by clients that use Google's QUIC protocol (UDP traffic on ports 80/443 from Chrome users to Google servers).
I would apreciate any ideas to get around this "issue".
Thank you.
Here is an example of the alerts:
IP: XXX.XXX.200.66
Attack type: udp_flood
Initial attack power: 216090 packets per second
Peak attack power: 216090 packets per second
Attack direction: incoming
Attack protocol: udp
Total incoming traffic: 2278 mbps
Total outgoing traffic: 0 mbps
Total incoming pps: 216090 packets per second
Total outgoing pps: 0 packets per second
Total incoming flows: 0 flows per second
Total outgoing flows: 0 flows per second
Average incoming traffic: 2278 mbps
Average outgoing traffic: 0 mbps
Average incoming pps: 216090 packets per second
Average outgoing pps: 0 packets per second
Average incoming flows: 0 flows per second
Average outgoing flows: 0 flows per second
Incoming ip fragmented traffic: 0 mbps
Outgoing ip fragmented traffic: 0 mbps
Incoming ip fragmented pps: 0 packets per second
Outgoing ip fragmented pps: 0 packets per second
Incoming tcp traffic: 0 mbps
Outgoing tcp traffic: 0 mbps
Incoming tcp pps: 68 packets per second
Outgoing tcp pps: 0 packets per second
Incoming syn tcp traffic: 0 mbps
Outgoing syn tcp traffic: 0 mbps
Incoming syn tcp pps: 0 packets per second
Outgoing syn tcp pps: 0 packets per second
Incoming udp traffic: 2278 mbps
Outgoing udp traffic: 0 mbps
Incoming udp pps: 216019 packets per second
Outgoing udp pps: 0 packets per second
Incoming icmp traffic: 0 mbps
Outgoing icmp traffic: 0 mbps
Incoming icmp pps: 0 packets per second
Outgoing icmp pps: 0 packets per second
Average packet size for incoming traffic: 1382.2 bytes
Average packet size for outgoing traffic: 0.0 bytes
Incoming
Hello,
I have im seeing some "false positive" DDoS alerts, aparently caused by clients that use Google's QUIC protocol (UDP traffic on ports 80/443 from Chrome users to Google servers).
I would apreciate any ideas to get around this "issue".
Thank you.
Here is an example of the alerts:
IP: XXX.XXX.200.66
Attack type: udp_flood
Initial attack power: 216090 packets per second
Peak attack power: 216090 packets per second
Attack direction: incoming
Attack protocol: udp
Total incoming traffic: 2278 mbps
Total outgoing traffic: 0 mbps
Total incoming pps: 216090 packets per second
Total outgoing pps: 0 packets per second
Total incoming flows: 0 flows per second
Total outgoing flows: 0 flows per second
Average incoming traffic: 2278 mbps
Average outgoing traffic: 0 mbps
Average incoming pps: 216090 packets per second
Average outgoing pps: 0 packets per second
Average incoming flows: 0 flows per second
Average outgoing flows: 0 flows per second
Incoming ip fragmented traffic: 0 mbps
Outgoing ip fragmented traffic: 0 mbps
Incoming ip fragmented pps: 0 packets per second
Outgoing ip fragmented pps: 0 packets per second
Incoming tcp traffic: 0 mbps
Outgoing tcp traffic: 0 mbps
Incoming tcp pps: 68 packets per second
Outgoing tcp pps: 0 packets per second
Incoming syn tcp traffic: 0 mbps
Outgoing syn tcp traffic: 0 mbps
Incoming syn tcp pps: 0 packets per second
Outgoing syn tcp pps: 0 packets per second
Incoming udp traffic: 2278 mbps
Outgoing udp traffic: 0 mbps
Incoming udp pps: 216019 packets per second
Outgoing udp pps: 0 packets per second
Incoming icmp traffic: 0 mbps
Outgoing icmp traffic: 0 mbps
Incoming icmp pps: 0 packets per second
Outgoing icmp pps: 0 packets per second
Average packet size for incoming traffic: 1382.2 bytes
Average packet size for outgoing traffic: 0.0 bytes
Incoming
UDP flows: 1
XXX.XXX.200.66:26392 < 216.58.222.33:443 3138494000 bytes 2270000 packets
My fastnetmon threshold settings are:
enable_connection_tracking = on
Different approaches to attack detection
ban_for_pps = off
ban_for_bandwidth = on
ban_for_flows = on
Limits for Dos/DDoS attacks
threshold_pps = 100000
threshold_mbps = 3000
threshold_flows = 3500
Per protocol attack thresholds
We don't implement per protocol flow limits, sorry :(
These limits should be smaller than global pps/mbps limits
threshold_tcp_mbps = 1000
threshold_udp_mbps = 600
threshold_icmp_mbps = 300
threshold_tcp_pps = 100000
threshold_udp_pps = 70000
threshold_icmp_pps = 50000
ban_for_tcp_bandwidth = off
ban_for_udp_bandwidth = on
ban_for_icmp_bandwidth = on
ban_for_tcp_pps = off
ban_for_udp_pps = off
ban_for_icmp_pps = off
The text was updated successfully, but these errors were encountered: