Netscout University - Lab - Zombie Detection Countermeasure
Netscout University - Lab - Zombie Detection Countermeasure
Finished
Volumetric Attacks
Lab Description
Examine the details of a zombie attack and use the Zombie Detection countermeasure to mitigate the misuse traffic
for the customer managed object.
Duration:
25 minutes
Platform:
https://sightline186.ne.netscout.com
Username:
NE186
Password:
Vafaseyu2!
⚠ Please ensure you read each step carefully before performing the required task in the order described.
1. Zombie Attack
Username: NE186
Password: Vafaseyu2!
2 Monitor the deployment for new DoS alerts, go to Alerts > Ongoing. Answer the following questions by
reviewing the most recent alert listed.
3 Select the alert and use the Summary and Traffic Details tabs to identify the following information:
What protocol(s) are reported?
4 Click on the Mitigate Alert button and select Threat Management to begin mitigating this alert.
5 We keep the provisioned mitigation configuration and select Save and Start for this mitigation.
https://cx.netscout.com/lab/468/EN 1/5
25/01/2023 12:09 Netscout University - Lab "Volumetric Attacks"
Finished
6 To counter this volumetric attack, we want to differentiate legitimate user from attackers. To do so, we will use
the Zombie Detection countermeasure. The goal is to count bps and pps sent by each source host
independently and compare it against a threshold. If above, then the source IP is considered a violating host.
7 From a previous peace time study, the system administrator found out that legitime users were usually not
sending more than 25 pps. (How this is done would be covered in the Sightline DDoS Detection and Mitigation
Administrator class).
With this information, find an appropriate threshold. Select Enable Zombie Detection and configure the All
Host pps threshold.
Answer the following questions:
What Zombie Detection - Threshold (pps) did you set?
Need Help
It may be appropriate that the available reference values are viewed more liberally, which means that a
proportionate offset is added to it, thus ensuring that at least this configuration doesn't cause over-
dropping. The used threshold value can then be adjusted and reduced at any time, should this become
necessary.
8 After waiting a minute, do you notice traffic being dropped (1 Min Avg)?
9 Is the Zombie Detection countermeasure dropping only packets above the configure threshold or blocking
offending hosts?
Check Solution
Source hosts violating any of the configured Zombie Detection Thresholds (All Hosts or Flexible 1 to 5)
will be blocked. This means they are added to the dynamic deny list and all traffic will be discarded for the
length the source host stays on this deny list.
Need Help
You will find a counter at the bottom of the Zombie Detection countermeasure, below the graph.
11 Reviewing the packets using the Sample Packets, can you find a common attribute shared by most/all dropped
packets?
https://cx.netscout.com/lab/468/EN 2/5
25/01/2023 12:09 Netscout University - Lab "Volumetric Attacks"
Finished
Need Help
Check Solution
https://cx.netscout.com/lab/468/EN 3/5
25/01/2023 12:09 Netscout University - Lab "Volumetric Attacks"
Finished The packets dropped are on average larger (all are at least > 400 bytes) than those packets that are
passing.
12 Remove the threshold configuration for All Host and build a Flexible Zombie to match on packets larger then
400 bytes.
Filter: bpp 400..1500
Set the Threshold to 20 pps.
Don’t forget to click on Save.
Check Solution
Since the proportion of large packets in legitimate user traffic is small, chances of dropping traffic from a
legitimate source as a false positive was reduced.
14 Click on the Download Blocked Hosts button and view the downloaded file.
15 Click on the Download Top Blocked Hosts button and view the downloaded file.
What is the difference between Blocked Hosts and Top Blocked Hosts file?
Check Solution
Top Blocked Hosts includes the blocked sources for which we dropped the most traffic since the
beginning of the mitigation.
Blocked Host only outputs the source IP adresses currently on the dynamic deny list.
Well Done
You can click on the button below to report back to the trainer.
Tell us what do you think of this lab, and how it could be improved ?
https://cx.netscout.com/lab/468/EN 4/5
25/01/2023 12:09 Netscout University - Lab "Volumetric Attacks"
Finished
Save
If you would like a copy of this lab select either the Print or the Save Page As (Control-S) menu options from
your browser’s dropdown menu. Need Help
https://cx.netscout.com/lab/468/EN 5/5