Skip to Content.
Sympa Menu

netsec-sig - RE: [Security-WG] What tools do people use to trigger Zenedge/Oracle Dyn's scrubbing service?

Subject: Internet2 Network Security SIG

List archive

RE: [Security-WG] What tools do people use to trigger Zenedge/Oracle Dyn's scrubbing service?


Chronological Thread 
  • From: "Magorian, Daniel F." <>
  • To: "" <>
  • Subject: RE: [Security-WG] What tools do people use to trigger Zenedge/Oracle Dyn's scrubbing service?
  • Date: Tue, 20 Nov 2018 21:12:40 +0000
  • Accept-language: en-US
  • Ironport-phdr: 9a23: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

Thanks Brad and Mark:

 

Having just had a particularly nasty set of false positives autotriggered by RapidBGP, the concern to have a person in the loop is starting to come into focus!

 

So we have no experience with Kentik Detect.  I assume it is a cloud analytics service that you set up vpn tunnels to and send your netflow over; is anyone concerned about sending your netflow to those kind of folks in CA, even tunneled?   Looks easy enough to get started; how much does it cost after the trial period?  

 

I assume folks use it to look at your peering data and a bunch of other analytics off the routers, not just DDoS.

 

So did anyone do an actual detection and triggering comparison of Arbor Peakflow Virtual vs Kentik vs FastNetMon?    Or did everyone get started with one and then stick with that?

 

Dan

 

From: <> On Behalf Of Brad Fleming
Sent: Tuesday, November 20, 2018 3:20 PM
To:
Subject: Re: [Security-WG] What tools do people use to trigger Zenedge/Oracle Dyn's scrubbing service?

 

Here’s the general flow for KanREN..

 

1) We dump IPFIX from our routers to Kentik.

2) Build rules in Kentik which identify traffic patterns we find suspicious.

3) Kentik fires an event to an on-network application we wrote.

           a) It does some basic triage and presents the alarm in a KanREN staff portal.

4) If a human agrees with the alarm we can trigger a scrub route from the web interface.

5) Application does a netconf push to a Juniper vMX trigger box we use for RTBHR, flowspec, sBHR, and scrubbing which then signals to the core network.

 

Releasing the scrub route is currently a manual process. We have to watch the event in the Zenedge dashboard or simply guess when we think the event has passed. Releasing the scrub route is also done via the web interface. We can also add an event via the web interface if a Kentik rule didn’t catch something.

 

All of this could be automated; we’re just worried about false positives in the Kentik ruleset we created. We’re also not 100% we have the API calls correct to get status from the ZE portal. Having a human check it (or communicate with their SOC) provides some degree of final check.

 

We have a few members with /24 assignments from ARIN. For that reason we have to do some routing table tricks to keep those /24s in our internal route table but remove them from all the upstream transit carriers. The attached diagram kinda shows the problem; it was drawn mainly for the internal technical group at KanREN so you might see references to some communities that don’t make sense.

 

And of course we allow BGP-speaking members to signal scrub routes to us directly via community string which makes all the routing messes simpler by a country mile. 

 

If anyone is interested I can share some screenshots of our web interface.

--
Brad Fleming
Assistant Director for Technology
Kansas Research and Education Network
Office:  785-856-9805
Mobile:  785-865-7231
NOC:    785-856-9820

 

 

 

Dan, OSHEAN may be one of those employing Kentik - if you're interested in hearing how OSHEAN integrated Kentik into an automated detection and scrubbing architecture with Akamai let us know. 

 

Attached is an Akamai brief on our implementation, while it does not highlight Kentik, Kentik's analytics engine drives the code we've developed that detects an attack on the OSHEAN network and members.

 

Thanks - Mark

 

Mark Montalto - Vice President

617-827-6928

 

Attachment: smime.p7s
Description: S/MIME cryptographic signature




Archive powered by MHonArc 2.6.19.

Top of Page