Over the past few weeks we have observed DDoS type attacks on 4 different data centres across Canada, United States, Germany and France where we have dedicated servers hosted. We have not experienced a situation where **ALL** the data centres were affected the same day. Our VoIP services redundancy at the DNS and DNS/SRV level kicks in immediately to avoid downtime for clients, when a DDoS affects the network traffic to/from our servers.

Fortunately we have not been the targets and it upsets any business owner if one of their servers are affected (regardless of the level of redundancy)
The origination of these DDoS attacks were from Amazon clouds.

Even though the attacks were not targeted towards our servers, it has impacted us along with all the hundreds of servers connected at the data centres, which are shared on the same core switch.

These DDoS attacks that we have witnessed at the data centres lasts for *factors* of 5 minutes, and are **CLOCK WORK**. Between 8:00 and 8:30 PM Toronto Local Time - specifically on Thursdays & Fridays. The network team at the data centres (my hats off to them) had identified the targeted server, null routed them and problems solved. At one point, I've been advised that the targeted server(s) were being pounded with 8 Gbps of attacks.

So this naturally gets me more curious.
The common denominator of these DDoS type attacks appear to be "high bandwidth" usage.
It disrupts services on not only the "victim" but everyone close by.

The data centres are using closed source proprietary products such as PeakFlow from Arbor Networks. We monitor our activity and do analysis with a bunch of open source software. These are mainly products for network monitoring (ntop and miscellaneous), old school packet captures, peak flow traffic, and so on and so on.

Wireshark, Etherreal, pcap, ntop etc etc etc network analysis tools are great. They require an intelligent person behind the keyboard for the "analysis" **after** an issue as been identified.

*Would like to ask the community here for input on: *
- Open Source type product for possible DDoS type detection (that does basic analysis for you & identifies peak traffic flow *real time*) - UDP level - SIP flooding type DDoS attack detection (open and closed source) - Pattern Matching / Fake SIP registration detection at the "packet level" - before it hits Asterisk process.

Ultimately I'm looking for a tool (preferably open source) that alerts an operator with basic computer skills of abnormal behaviour.
/*
*//*Thanks and regards,*//*
*//*Reza.*/
--
--
FOUNDER & SR. TELECOM ANALYST
VOIPERNETICS COMMUNICATIONS
NATION WIDE DIDS, SIP TRUNKS & VOIP 911.
PARTIAL / FULL VIRTUAL PRI - NO CONTRACTS!
HOSTED PBX & TERMINATION SERVICES.
TEL:  647-476-2067

Reply via email to