Rate-based attacks are attacks that depend on frequency of
connection or repeated attempts to perpetrate the attack. You can use
rate-based detection criteria to detect a rate-based attack as it occurs and
respond to it when it happens, then return to normal detection settings after
it stops.
You can configure your network analysis policy to include
rate-based filters that detect excessive activity directed at hosts on your
network. You can use this feature on managed devices deployed in inline mode to
block rate-based attacks for a specified time, then revert to only generating
events and not drop traffic.
The SYN attack prevention option helps you protect your network
hosts against SYN floods. You can protect individual hosts or whole networks
based on the number of packets seen over a period of time. If your device is
deployed passively, you can generate events. If your device is placed inline,
you can also drop the malicious packets. After the timeout period elapses, if
the rate condition has stopped, the event generation and packet dropping stops.
For example, you could configure a setting to allow a maximum number of SYN packets from any one IP address, and block further
connections from that IP address for 60 seconds.
You can also limit TCP/IP connections to or from hosts on your
network to prevent denial of service (DoS) attacks or excessive activity by
users. When the system detects the configured number of successful connections
to or from a specified IP address or range of addresses, it generates events on
additional connections. The rate-based event generation continues until the
timeout period elapses without the rate condition occurring. In an inline
deployment you can choose to drop packets until the rate condition times out.
For example, you could configure a setting to allow a maximum of
10 successful simultaneous connections from any one IP address, and block
further connections from that IP address for 60 seconds.
Note
|
Devices load-balance inspection across internal resources. When you configure rate-based attack prevention, you configure
the triggering rate per resource, not per device. If rate-based attack prevention is not working as expected, you may need
to lower the triggering rate. It triggers alert, if users send too many connection attempts within prescribed time intervals.
Hence it is recommended to rate limit the rule. For help determining the correct rate, contact Support.
|
The following diagram shows an example where an attacker is
attempting to access a host. Repeated attempts to find a password trigger a
rule which has rate-based attack prevention configured. The rate-based settings
change the rule attribute to Drop and Generate Events after rule matches occur
five times in a 10-second span. The new rule attribute times out after 15
seconds.
After the timeout, note that packets are still dropped in the
rate-based sampling period that follows. If the sampled rate is above the
threshold in the current or previous sampling period, the new action continues.
The new action reverts to generating events only after a sampling period
completes where the sampled rate is below the threshold rate.