Symantec 10521146 Administration Guide - Page 165

UDP Flood Alert Threshold, Slow Scan Alert Threshold, Saturation parameters

Page 165 highlights

Detecting 165 Configuring sensor detection UDP Flood Alert Threshold UDP Flood Alert Threshold regulates the level at which the sensor notifies you of a UDP flood. If the sensor detects a greater percentage of unacknowledged UDP connections than the Threshold, it triggers a flood event. The default is set to 0.50 (50%) for a high level of sensitivity. Valid values range from 0 to 1. Increase the value to make the sensor less sensitive; decrease the value to make it more sensitive. A value of 1% is extremely sensitive, which impacts system performance somewhat if it generates alerts. It interacts with Streak Interval and UDP Number of Streak Packets, and affects performance slightly if changed. Note: In versions prior to 4.0, this parameter controlled input and detected both portscans and floods. Now this parameter controls output and detects either port scans or floods separately. Slow Scan Alert Threshold Slow Scan Alert Threshold regulates the level at which the sensor notifies you of sweep or scan activity. The sensor detects attempts to connect to the same port across multiple hosts, which can indicate sweep activity. The sensor also detects attempts to connect to the same host on multiple ports, which can indicate scan activity. If the number of attempts breaches the Threshold, it triggers a slow scan event. The default is set to 7, and valid values range from 3 to 15, inclusive. If your network traffic commonly includes many dropped or unacknowledged connections, you can increase the value to adjust the sensor's tolerance for this activity. You can decrease the value to make the sensor more sensitive to this activity, at the cost of affecting performance slightly. Saturation parameters The following parameters regulate the percentage of a variety of types of traffic that the sensor tolerates before it notifies you. Symantec Network Security provides counter-based detection of floods and denial-of-service attacks such as resource reservation and pipe filling. For example, in a reservation attack such as SYNflood, the attacker sends more SYN packets than the queue can hold, and thus reserves otherwise available resources and prevents new connections. In a pipe-filling attack, the attacker saturates the links by generating so much traffic on a network connection that it clogs a traffic pipe.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

165
Detecting
Configuring sensor detection
UDP Flood Alert Threshold
UDP Flood Alert Threshold
regulates the level at which the sensor notifies you of
a UDP flood. If the sensor detects a greater percentage of unacknowledged UDP
connections than the Threshold, it triggers a flood event.
The default is set to 0.50 (50%) for a high level of sensitivity. Valid values range
from 0 to 1. Increase the value to make the sensor less sensitive; decrease the
value to make it more sensitive. A value of 1% is extremely sensitive, which
impacts system performance somewhat if it generates alerts. It interacts with
Streak Interval
and
UDP Number of Streak Packets
, and affects performance
slightly if changed.
Note:
In versions prior to 4.0, this parameter controlled input and detected both
portscans and floods. Now this parameter controls output and detects either
port scans or floods separately.
Slow Scan Alert Threshold
Slow Scan Alert Threshold
regulates the level at which the sensor notifies you of
sweep or scan activity. The sensor detects attempts to connect to the same port
across multiple hosts, which can indicate sweep activity. The sensor also detects
attempts to connect to the same host on multiple ports, which can indicate scan
activity. If the number of attempts breaches the Threshold, it triggers a slow
scan event.
The default is set to 7, and valid values range from 3 to 15, inclusive. If your
network traffic commonly includes many dropped or unacknowledged
connections, you can increase the value to adjust the sensor’s tolerance for this
activity. You can decrease the value to make the sensor more sensitive to this
activity, at the cost of affecting performance slightly.
Saturation parameters
The following parameters regulate the percentage of a variety of types of traffic
that the sensor tolerates before it notifies you.
Symantec Network Security provides counter-based detection of floods and
denial-of-service attacks such as resource reservation and pipe filling. For
example, in a reservation attack such as SYNflood, the attacker sends more SYN
packets than the queue can hold, and thus reserves otherwise available
resources and prevents new connections. In a pipe-filling attack, the attacker
saturates the links by generating so much traffic on a network connection that it
clogs a traffic pipe.