Return to site

Botnet Filter Asa Configuration

broken image


Page 37 Enabling Traffic Classification and Actions for the Botnet Traffic Filter 50-10 Blocking Botnet Traffic Manually 50-12 Searching the Dynamic Database 50-13 Monitoring the Botnet Traffic Filter 50-13 Botnet Traffic Filter Syslog Messaging 50-13 Botnet Traffic Filter Monitor Panes 50-14 Cisco ASA 5500 Series Configuration Guide using ASDM. Which statement about the Cisco ASA botnet traffic filter is true?A. The four threat levels are low, moderate, high, and very high.B. By default, the dynamic-filter drop blacklist interface outside command drops traffic with a threat level ofhigh or very high.C. Static blacklist entries always have a very high threat level.D.Continue reading.

Denial of Service attacks (DoS) are very common these days. Especially Distributed DoS attacks (called also DDoS) can be executed quite easily by attackers who own large networks of BotNets.

Botnet

The static database functionality of the Botnet Traffic Filter works a little differently from the dynamic functionality. When a static entry is entered into the database, the ASA will wait one minute and perform a 'normal' DNS lookup of the IP address matching the configured entry; the returned response will be entered into the ASA's DNS Host Cache.

Thousands of malware-infected computers (which comprise the so called 'BotNets') are controlled by attackers and can be instructed to start attacks at any target.

Botnet

Usually WebSites are targeted more frequently. Bringing down a website can have a negative effect to the image (in addition to any financial loss) of the company owing the site.

Botnet Filter Asa Configuration

A DDoS attack can be purely 'volumetric', which means that the attacker just sends high volume of packets as quickly as possible to flood the bandwidth of the 'pipe' connecting the website to the Internet.

Also, DDoS attacks can be 'Application Resource Exhaustion' which means that the attacking computers create thousands of application requests (e.g HTTP Requests) to a server, thus consuming the application resources.

A Cisco ASA Firewall can not help much in a 'volumetric' DDoS attack. In such an attack, a dedicated DDoS device is needed or your ISP must do some kind of rate limiting to mitigate the attack.

However, for 'Application Exhaustion' attacks a Cisco ASA can help to some extend with HTTP inspection using the Modular Policy Framework mechanism of ASA. This is what we are going to describe in this article.

Usually, HTTP Application DDoS attacks have a pattern or string which helps you distinguish the attacking HTTP requests from other legitimate requests.

For example, HTTP attacking packets might have a common parameter or string, which can be for example the same 'User-Agent' used by the attacking script, a common POST or GET URI request, some other HTTP header parameters etc.

With the ASA HTTP inspection feature you can match on this common pattern in the HTTP packet thus filter-out the attacking packets and drop them.

Dynamic Botnet List Server

Recently I was engaged to help mitigate a DDoS attack on a webserver. I observed from the Apache logs that the attacking HTTP requests were all targeting the website on the same URL string, such as http://www.website.com/xyz123.

The string 'xyz123' was the common pattern for all malicious HTTP requests. Thus with a policy on ASA you can match on the unique string above and drop the packets that have this string in the HTTP URI.

Lets see a diagram and configuration below:

ASA Configuration:

!First create a regular expression with the unique attack string
regex attackstring xyz123

!Create an ACL to match the HTTP traffic towards the target server
access-list HTTPTRAFFIC extended permit tcp any host 1.1.1.1 eq www

Botnet

!Create a regular L3/L4 class to match the traffic above
class-map attackingtraffic
match access-list HTTPTRAFFIC

Botnet Filter Asa Configuration Guide

!Now create an HTTP inspection policy to match on the unique attacking string
policy-map type inspect http HTTPDOS
parameters
match request uri regex attackstring
drop-connection
match request args regex attackstring
drop-connection

All

The static database functionality of the Botnet Traffic Filter works a little differently from the dynamic functionality. When a static entry is entered into the database, the ASA will wait one minute and perform a 'normal' DNS lookup of the IP address matching the configured entry; the returned response will be entered into the ASA's DNS Host Cache.

Thousands of malware-infected computers (which comprise the so called 'BotNets') are controlled by attackers and can be instructed to start attacks at any target.

Usually WebSites are targeted more frequently. Bringing down a website can have a negative effect to the image (in addition to any financial loss) of the company owing the site.

A DDoS attack can be purely 'volumetric', which means that the attacker just sends high volume of packets as quickly as possible to flood the bandwidth of the 'pipe' connecting the website to the Internet.

Also, DDoS attacks can be 'Application Resource Exhaustion' which means that the attacking computers create thousands of application requests (e.g HTTP Requests) to a server, thus consuming the application resources.

A Cisco ASA Firewall can not help much in a 'volumetric' DDoS attack. In such an attack, a dedicated DDoS device is needed or your ISP must do some kind of rate limiting to mitigate the attack.

However, for 'Application Exhaustion' attacks a Cisco ASA can help to some extend with HTTP inspection using the Modular Policy Framework mechanism of ASA. This is what we are going to describe in this article.

Usually, HTTP Application DDoS attacks have a pattern or string which helps you distinguish the attacking HTTP requests from other legitimate requests.

For example, HTTP attacking packets might have a common parameter or string, which can be for example the same 'User-Agent' used by the attacking script, a common POST or GET URI request, some other HTTP header parameters etc.

With the ASA HTTP inspection feature you can match on this common pattern in the HTTP packet thus filter-out the attacking packets and drop them.

Dynamic Botnet List Server

Recently I was engaged to help mitigate a DDoS attack on a webserver. I observed from the Apache logs that the attacking HTTP requests were all targeting the website on the same URL string, such as http://www.website.com/xyz123.

The string 'xyz123' was the common pattern for all malicious HTTP requests. Thus with a policy on ASA you can match on the unique string above and drop the packets that have this string in the HTTP URI.

Lets see a diagram and configuration below:

ASA Configuration:

!First create a regular expression with the unique attack string
regex attackstring xyz123

!Create an ACL to match the HTTP traffic towards the target server
access-list HTTPTRAFFIC extended permit tcp any host 1.1.1.1 eq www

!Create a regular L3/L4 class to match the traffic above
class-map attackingtraffic
match access-list HTTPTRAFFIC

Botnet Filter Asa Configuration Guide

!Now create an HTTP inspection policy to match on the unique attacking string
policy-map type inspect http HTTPDOS
parameters
match request uri regex attackstring
drop-connection
match request args regex attackstring
drop-connection

!The following policy-map will include the L3/L4 class which will include the HTTP inspection policy
policy-map BLOCKDOS
class attackingtraffic
inspect http HTTPDOS

Sonicwall Botnet Filter

!Now attach the policy-map to the ASA outside interface to inspect Inbound traffic.
service-policy BLOCKDOS interface outside

If you enable logging on the drop-connection command (use 'drop-connection log'), then you will start seeing logs that the ASA is dropping packets with the matched attacking HTTP string. Bunnytown ice cream.

Cyber2day 39 followers on LinkedIn. De mens van zwakke naar sterke schakel Cyber2day is gespecialiseerd in het verzorgen van Cyberawareness trainingen van. Cyber today.

DOWNLOAD THIS ARTICLE AS PDF FILE

Gateway Botnet Filter Alert

Related Posts





broken image