Simple policy to detect ws-discovery DNS amplification attack

Following functionality are provided by the script

:: 1) identifies spoofed traffic and subsiquent DNS amplification attack 2) builds you a list of possible sources which are responding to 3072/udp DNS amplification attack


zkg install zeek/initconf/ws-discovery-dos or @load ws-discovery-dos/scripts

Detailed Notes:

Detail Alerts and descriptions: Following alerts are generated by the script:

Heuristics are simple: check for

This should generate following Kinds of notices:

Example notice:

1557480963.014124 CHhAvVGS1DHFjwGM9 20922 3702 - - - udp Signatures::Sensitive_Signature ws-discovery-dos <\xaa> 3702 - - Notice::ACTION_LOG 3600.000000 - - - - -

Package Version :