F5F Stay Refreshed Power Users Networks Attack traffic via HTTP flood using Snort.

Attack traffic via HTTP flood using Snort.

Attack traffic via HTTP flood using Snort.

A
aadnemellum
Junior Member
49
09-27-2016, 04:15 PM
#1
Placing a snort appliance in front of a web server to rate limit and block attack traffic could provide some protection against DDoS attempts, but its effectiveness depends on configuration and the type of threats you face. It might help detect and drop malicious packets during attacks, though it won't prevent large-scale bandwidth floods.
A
aadnemellum
09-27-2016, 04:15 PM #1

Placing a snort appliance in front of a web server to rate limit and block attack traffic could provide some protection against DDoS attempts, but its effectiveness depends on configuration and the type of threats you face. It might help detect and drop malicious packets during attacks, though it won't prevent large-scale bandwidth floods.

I
ItssHuahwi
Junior Member
15
09-27-2016, 08:22 PM
#2
More likely to generate incorrect alerts and affect legitimate requests.
I
ItssHuahwi
09-27-2016, 08:22 PM #2

More likely to generate incorrect alerts and affect legitimate requests.

T
TheAlexZ_
Member
210
09-28-2016, 01:17 AM
#3
The reverse proxy intended for this purpose would likely handle it similarly. It mainly limits traffic, yet Snort appears to surpass Nginx’s reverse proxy in throughput—packets per second.
T
TheAlexZ_
09-28-2016, 01:17 AM #3

The reverse proxy intended for this purpose would likely handle it similarly. It mainly limits traffic, yet Snort appears to surpass Nginx’s reverse proxy in throughput—packets per second.

T
TayZenFR
Junior Member
25
10-03-2016, 11:28 PM
#4
The Snort appliance integrates with various IPS/IDS solutions that support snort rules or their signature formats. These are linked to the functionalities of the connected devices or applications. False alarms mainly hinge on the network setup and the precision of the snort rule itself.
T
TayZenFR
10-03-2016, 11:28 PM #4

The Snort appliance integrates with various IPS/IDS solutions that support snort rules or their signature formats. These are linked to the functionalities of the connected devices or applications. False alarms mainly hinge on the network setup and the precision of the snort rule itself.

R
ripa5000
Posting Freak
884
10-16-2016, 11:24 AM
#5
Wouldn't implementing fail2ban on the server provide similar protection? It monitors traffic and temporarily blocks IPs when packet counts exceed normal thresholds. Incorporating a system that references known malicious IP lists would enhance security. I apply this approach on my pfSense router, adding region-specific blocklists to restrict access only to desired areas. Alternatively, you can route DNS through Cloudflare to proxy connections.
R
ripa5000
10-16-2016, 11:24 AM #5

Wouldn't implementing fail2ban on the server provide similar protection? It monitors traffic and temporarily blocks IPs when packet counts exceed normal thresholds. Incorporating a system that references known malicious IP lists would enhance security. I apply this approach on my pfSense router, adding region-specific blocklists to restrict access only to desired areas. Alternatively, you can route DNS through Cloudflare to proxy connections.

J
jobro140
Junior Member
11
10-16-2016, 04:54 PM
#6
It seems Snort or Suricata would likely offer better performance than fail2ban in terms of processing speed.
J
jobro140
10-16-2016, 04:54 PM #6

It seems Snort or Suricata would likely offer better performance than fail2ban in terms of processing speed.

M
Mr_Floobiful
Posting Freak
890
10-16-2016, 09:36 PM
#7
adjust traffic rules for a single IP to limit bursts. This approach aims to manage spikes by dropping excess packets within a time window, similar to how tools like fail2ban or NGinx rate limiting work. It focuses on preventing overload without relying on broader system policies.
M
Mr_Floobiful
10-16-2016, 09:36 PM #7

adjust traffic rules for a single IP to limit bursts. This approach aims to manage spikes by dropping excess packets within a time window, similar to how tools like fail2ban or NGinx rate limiting work. It focuses on preventing overload without relying on broader system policies.