⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 flow-dscan.1

📁 netflow,抓包
💻 1
字号:
...\" $Header: /usr/src/docbook-to-man/cmd/RCS/docbook-to-man.sh,v 1.3 1996/06/17 03:36:49 fld Exp $...\"...\"	transcript compatibility for postscript use....\"...\"	synopsis:  .P! <file.ps>...\".de P!\\&..fl			\" force out current output buffer\\!%PB\\!/showpage{}def...\" the following is from Ken Flowers -- it prevents dictionary overflows\\!/tempdict 200 dict def tempdict begin.fl			\" prolog.sy cat \\$1\" bring in postscript file...\" the following line matches the tempdict above\\!end % tempdict %\\!PE\\!..sp \\$2u	\" move below the image...de pF.ie     \\*(f1 .ds f1 \\n(.f.el .ie \\*(f2 .ds f2 \\n(.f.el .ie \\*(f3 .ds f3 \\n(.f.el .ie \\*(f4 .ds f4 \\n(.f.el .tm ? font overflow.ft \\$1...de fP.ie     !\\*(f4 \{\.	ft \\*(f4.	ds f4\"'	br \}.el .ie !\\*(f3 \{\.	ft \\*(f3.	ds f3\"'	br \}.el .ie !\\*(f2 \{\.	ft \\*(f2.	ds f2\"'	br \}.el .ie !\\*(f1 \{\.	ft \\*(f1.	ds f1\"'	br \}.el .tm ? font underflow...ds f1\".ds f2\".ds f3\".ds f4\".ta 8n 16n 24n 32n 40n 48n 56n 64n 72n .TH "\fBflow-dscan\fP" "1".SH "NAME"\fBflow-dscan\fP \(em Detect scanning and other suspicious network activity\&..SH "SYNOPSIS".PP\fBflow-dscan\fP [-bBhlmpwW]  [-d\fI debug_level\fP]  [-D\fI iplist_depth\fP]  [-s\fI state_file\fP]  [-i\fI input_filter\fP]  [-L\fI suppress_list\fP]  [-o\fI output_filter\fP]  [-O\fI excessive_octets\fP]  [-P\fI excessive_flows\fP]  [-S\fI port_scan_trigger\fP]  [-t\fI ager_timeout\fP] .SH "DESCRIPTION".PPThe \fBflow-dscan\fP utility is used to detect suspiciousactivity such as port scanning, host scanning, and flows with unusually high octets or packets\&.  A source and destination suppresslist is supported to help prevent false alarms due to hosts such asnameservers or popular web servers that exchange traffic with a largenumber of hosts\&.  Alarms are logged to syslog or stderr\&.  The internalstate of flow-dscan can be saved and loaded to allow for interrupted operation\&..PP\fBflow-dscan\fP will work best if configured to only watch only inbound or outboundtraffic by using the input or output interface filter option\&..PPThe host scanner works by counting the length of the destination IPhash chain\&.  If it goes above 64, then the src is considered tobe scanning\&..PPThe port scanner works by keeping a bitmap of the destination portnumber < 1024 per destination IP\&.  If it goes above 64, the src isconsidered to be port scanning the destination\&..PPWhen a src has been flagged as scanning it will not be reported againuntil the record is aged out and enough flows trigger it again\&..PPA SIGHUP signal will instruct flow-dscan to reload the suppress list\&..PPA SIGUSR1 signal will instruct flow-dscan to dump its internal state\&..SH "OPTIONS".IP "-b" 10Do not detach and run in the background\&.  Alerts go to stderr\&..IP "-B" 10Do not detach and run in the background\&.  Alerts go to syslog\&..IP "-d\fI debug_level\fP" 10Enable debugging\&..IP "-D\fI iplist_depth\fP" 10Depth of IP host list for detecting host scanning\&..IP "-h" 10Display help\&..IP "-i\fI input_filter\fP" 10Input interface filter list\&..IP "-I\fI output_filter\fP" 10Output interface filter list\&..IP "-l" 10Load state from \fB/var/tmp/dscan\&.state\fP or the filenamespecified with -s\&..IP "-L\fI suppress_list\fP" 10Basename of suppress files\&.  There are two suppress files for input andoutput traffic\&.  The suppress file syntax is.IP "" 10IP_address protocol source_port destination_port.IP "" 10A \&'-\&' can be used as a wildcard in the protocol, source_port,and destination_port fields\&.  Only a single protocol, source_port, anddestination_port is supported per IP address\&..IP "-m" 10Multicast address filter\&.  Use to ignore multicast addresses\&..IP "-O\fI excessive_octets\fP" 10Trigger an alert if a flow is processed with the octets field exceeding\fIexcessive_octets\fP\&..IP "-p" 10Dump state to \fB/var/tmp/dscan\&.state\fP or the filenamespecified with -s\&..IP "-P\fI excessive_packets\fP" 10Trigger an alert if a flow is processed with the packets field exceeding\fIexcessive_packets\fP\&..IP "-s\fI statefile\fP" 10State filename\&.  Defaults to \fB/var/tmp/dscan\&.state\fP.IP "-S\fI port_scan_trigger\fP" 10Number of ports a IP address must have used to be considered scanning\&..IP "-t\fI ager_timeout\fP" 10How long to keep flows around\&.  Default to 90000\&.  This is measured inflows processed\&..IP "-T\fI excessive_time\fP" 10Trigger an alert if a flow is processed with the End-Start field exceeding\fIexcessive_time\fP\&..IP "-w" 10Filter (ignore) candidate inbound www traffic, ie IP protocol 6, source port80, and destination port > 1023\&..IP "-W" 10Filter (ignore) candidate outbound www traffic, ie IP protocol 6, destinationport 80, and source  port > 1023\&..SH "EXAMPLES".PPIn a topology where 25 is the only output interface run flow-dscan overthe data in \fB/flows/krc4\fP\&.  Ignore www and multicasttraffic, store the internal state in\fBdscan\&.statefile\fP on exit\&.  Use empty suppress listfiles \fBdscan\&.suppress\&.src\fP and\fBdscan\&.suppress\&.dst\fP\&.  The output produced by flow-dscantypically must be manually inspected by using flow-filter and flow-print\&.Many of the alerts will be false until the suppress lists are populatedfor the local environment\&..PP  \fBflow-cat /flows/krc4 | flow-dscan -I25 -b -m -s dscan\&.statefile -p -W\fP.SH "BUGS".PPThe ager should automatically become more aggressive when a low memorycondition exists\&.There is no upper limit on the number of records that can be allocated\&.  Ifthe ager is not running often enough the host will be run out of memory\&..SH "AUTHOR".PPMark Fullmer maf@splintered\&.net.SH "SEE ALSO".PP\fBflow-tools\fP(1)...\" created by instant / docbook-to-man, Sat 08 Jun 2002, 23:41

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -