Project 3: Analyzing a possible DoS attack using network logs
- Ben Lee
- May 25, 2023
- 3 min read
Updated: Jul 10, 2023
Today I'll be analyzing some network logs provided by the Google Cybersecurity program.
This is the first scenario I was provided:
You are a cybersecurity analyst working at a company that specializes in providing IT consultant services. Several customers contacted your company to report that they were not able to access the company website www.yummyrecipesforme.com, and saw the error “destination port unreachable” after waiting for the page to load.
You are tasked with analyzing the situation and determining which network protocol was affected during this incident. To start, you visit the website and you also receive the error “destination port unreachable.”
Next, you load your network analyzer tool, tcpdump, and load the webpage again. This time, you receive a lot of packets in your network analyzer. The analyzer shows that when you send UDP packets and receive an ICMP response returned to your host, the results contain an error message: “udp port 53 unreachable.”
Now that you have captured data packets using a network analyzer tool, it is your job to identify which network protocol and service were impacted by this incident. Then, you will need to write a follow-up report.
Here are the logs provided to me that a packet analyzer like tcpdump would output:
After analyzing the logs and learning how to read and understand them, I responded to this fictional incident by completing a cybersecurity incident report based on my findings and conclusions on the network traffic analysis:
This is the second scenario I was provided:
You work as a security analyst for a travel agency that advertises sales and promotions on the company’s website. The employees of the company regularly access the company’s sales webpage to search for vacation packages their customers might like.
One afternoon, you receive an automated alert from your monitoring system indicating a problem with the web server. You attempt to visit the company’s website, but you receive a connection timeout error message in your browser.
You use a packet sniffer to capture data packets in transit to and from the web server. You notice a large number of TCP SYN requests coming from an unfamiliar IP address. The web server appears to be overwhelmed by the volume of incoming traffic and is losing its ability to respond to the abnormally large number of SYN requests. You suspect the server is under attack by a malicious actor.
You take the server offline temporarily so that the machine can recover and return to a normal operating status. You also configure the company’s firewall to block the IP address that was sending the abnormal number of SYN requests. You know that your IP blocking solution won’t last long, as an attacker can spoof other IP addresses to get around this block. You need to alert your manager about this problem quickly and discuss the next steps to stop this attacker and prevent this problem from happening again. You will need to be prepared to tell your boss about the type of attack you discovered and how it was affecting the web server and employees.
Here are the logs provided to me that a packet analyzer like wireshark would output:
After analyzing the logs and learning how to understand them, I responded to this fictional incident by completing a cybersecurity incident report based on my findings and conclusions on the network traffic analysis:
This has been my first time reading network logs and I have learnt a lot with this assignment
Commentaires