After the basic policy is configured, a basic defense policy is automatically generated on each associated device of the Zone to detect inbound traffic.
The AntiDDoS1820-N inbound defense policy is used to detect various types of attack traffic. When the rate or bandwidth of the attack traffic exceeds the preset threshold, the AntiDDoS1820-N reports an anomaly event to the ATIC.
Host Total Traffic Overflow attack
Attackers send heavy traffic to the target IP address. This attack may cause link congestion, slow server response, and even network crash.
TCP packets have six flag bits: URG, ACK, PSH, RST, SYN, and FIN. If any flag bit is abnormal, the TCP packets are considered abnormal.
Attackers send SYN packets with forged source addresses to hosts. The hosts reply with SYN-ACK packets to the source addresses, but will not receive any ACK packets. As a result, the hosts keep many half-open connections until the connections time out. These half-open connections can exhaust host resources so that the hosts cannot establish normal TCP connections.
TCP fragments seldom occur in normal network traffic. If the number of TCP fragments increases on the network, DDoS attacks may occur. Attackers send large numbers of TCP fragments to the targets, which bring the following adverse impacts:
Attackers use botnets to send a large number of ACK packets, which bring the following adverse impacts:
An attacker uses a botnet to send a large number of FIN/RST packets with changing source IP addresses and ports. Such attack packets compromise the performance of session-based forwarding devices or even crash the network to cause a denial of service.
Attackers use botnets to send large numbers of oversized UDP packets at a high rate to target servers, which bring the following adverse impacts:
Attackers send large numbers of UDP fragments to the targets, which bring the following adverse impacts:
DNS Query Flood attacks can be launched on DNS cache servers and DNS authoritative servers.
Attackers send mass DNS query carrying invalid domain names to overload the DNS cache server. As a result, the DNS cache server cannot respond to users' DNS query.
Attacks on authoritative servers
Attackers send mass DNS query carrying invalid subdomain names to overload the DNS authoritative server. As a result, the DNS authoritative server fails to respond to users' DNS query.
An attacker sends a large number of forged DNS reply packets to a certain DNS server or host to consume server performance.
The DNS reflection attack is a typical DNS reply flood attack. By imitating the attack target, the attacker sends a large number of DNS query query to the DNS server and enlarges the reply packets, and forwards them to the attack target to congest the network.
Attackers send mass HTTP packets to the target server using proxies or zombie hosts. Such query involve operation-related URIs or other resource-consuming URIs to exhaust server resources. For example, portal websites are frequently attacked by HTTP Flood attacks. Such attacks consume server CPU resources or URIs of memory resources, such as database operation-related URIs.
Attackers launch a large number of HTTPS connections to the target server directly or through proxies or botnets. As a result, the server is overloaded and unable to respond to legitimate requests.
SIP is an application-layer signaling control protocol. It is used to create, modify, and release one or more sessions, such as Internet multimedia conferences, IP phone calls, or multimedia distribution. For example, SIP service providers can create new media that include voice, video, and chat content.
Attackers can send mass INVITE messages to the target SIP server to exhaust the SIP server resources and make the server unable to respond to legitimate call requests. Attackers can also exploit the vulnerabilities of SIP implementation on the VoIP devices to forge and send malformed packets, resulting in the DoS of the SIP server.
Attackers send mass ICMP packets to the target in a short period of time, exhausting session resources on network devices. If the attackers send oversized packets over a network link, the network link may be congested.
Other Flood attacks refer to service attacks except TCP, UDP, ICMP, DNS, SIP, HTTP, and HTTPS attacks.
Dark IP addresses indicate the IP addresses that do not appear on the Internet, including:
of the Zone.
in the Operation column corresponding to the default defense policies starting with basic.
Parameter |
Description |
Recommended Value |
|
|---|---|---|---|
Host Total Traffic Overflow Detect |
PacketRate Threshold |
When the rate or bandwidth of the traffic destined for an IP address exceeds the preset threshold, an anomaly event is reported to the ATIC. |
Set PacketRate Threshold and Bandwidth Threshold based on the actual network bandwidth settings. |
Bandwidth Threshold |
|||
Tcp Malformed Flood Detect/Defence |
PacketRate Threshold |
When the rate or bandwidth of abnormal TCP packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
Set PacketRate Threshold and Bandwidth Threshold based on the actual network bandwidth settings. |
Bandwidth Threshold |
|||
Tcp Syn Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of SYN packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
Tcp Fragment Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of TCP fragments exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
Tcp Ack Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of ACK packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
Tcp Rst/Fin Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of FIN/RST packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
UDP Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of UDP packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
UDP Fragment Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of UDP fragments exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
DNS Query Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of DNS Query packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
DNS Reply Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of DNS Reply packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
HTTP Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of all HTTP packets, including SYN, SYN-ACK, and ACK packets used for setting up TCP connections, exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
HTTPS Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of HTTPS packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
SIP Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of SIP packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
ICMP Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of ICMP packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
Other Flood Detect |
PacketRate Threshold |
When the rate or bandwidth of service packets except TCP, UDP, ICMP, DNS, SIP, HTTP, and HTTPS packets exceeds the preset threshold, an anomaly event is reported to the ATIC. |
You are advised to set these thresholds based on baseline learning. For details, see Configuring a Baseline Learning Task. |
Bandwidth Threshold |
|||
Dark Ip Detect |
PacketRate Threshold |
When the rate or bandwidth of the traffic destined for an unavailable public IP address exceeds the preset threshold, an anomaly event is reported to the ATIC. |
Set PacketRate Threshold and Bandwidth Threshold based on the actual network bandwidth settings. |
Bandwidth Threshold |
|||
on the Inbound Defense Policy tab to copy the defense policy configuration from an associated device to another.