2014-06-08 20:49:25 +02:00
FastNetMon
2013-11-14 09:23:10 +01:00
===========
2015-03-10 23:38:10 +01:00
Author: [Pavel Odintsov ](http://ru.linkedin.com/in/podintsov/ ) pavel.odintsov at gmail.com [My Twitter ](https://twitter.com/odintsov_pavel )
2014-06-23 14:55:20 +02:00
License: GPLv2
2013-10-18 12:09:53 +02:00
2015-03-10 21:06:21 +01:00
FastNetMon - A high performance DoS/DDoS and netflowk load analyzer built on top of multiple packet capture engines (netmap, PF_RING, sFLOW, Netflow, PCAP).
2013-10-18 12:21:41 +02:00
2015-03-10 21:06:21 +01:00
What can we do? We can detect hosts in our own network with a large amount of packets per second/bytes per second or flow per second incoming or outgoing from certain hosts. And we can call an external script which can notify you, switch off a server or blackhole the client.
2013-10-22 01:29:00 +02:00
2015-03-10 21:06:21 +01:00
Why did we write this? Because we can't find any software for solving this problem in the open source world!
2014-11-22 14:17:26 +01:00
2015-03-13 16:32:38 +01:00
- [Install manual for any Linux ](docs/INSTALL.md )
- [Install manual for FreeBSD ](docs/FreeBSD_INSTALL.md )
- [Install manual for Mac OS X ](docs/MAC_OS_INSTALL.md )
- [Install manual for Slackware ](docs/SLACKWARE_INSTALL.md )
2014-11-22 14:24:50 +01:00
2015-01-27 12:26:44 +01:00
[![Build Status ](https://travis-ci.org/FastVPSEestiOu/fastnetmon.svg?branch=master )](https://travis-ci.org/FastVPSEestiOu/fastnetmon) [![Gitter ](https://badges.gitter.im/Join%20Chat.svg )](https://gitter.im/FastVPSEestiOu/fastnetmon?utm_source=badge& utm_medium=badge& utm_campaign=pr-badge)
2015-01-24 16:40:45 +01:00
2014-11-22 14:17:26 +01:00
Features:
- Can process incoming and outgoing traffic
2015-03-10 21:06:21 +01:00
- Can trigger block script if certain IP loads network with a large amount of packets per second
- Can trigger block script if certain IP loads network with a large amount of bytes per second
- Can trigger block script if certain IP loads network with a large amount of flows per second
2015-03-10 15:16:18 +01:00
- netmap support (open source; wire speed processing; only Intel NICs)
2015-03-10 21:06:21 +01:00
- PF_RING ZC/DNA support (wire speed processing on tens of MPPS but needs [license ](http://www.ntop.org/products/pf_ring/ ))
2014-12-19 14:31:22 +01:00
- Can process ![sFLOW ](http://sflow.org/images/sflowlogo.gif ) v5
2015-01-28 21:29:39 +01:00
- Can process NetFlow v5 and v9
2015-01-27 11:03:15 +01:00
- Can use PCAP for packet sniffing
2014-12-02 14:05:16 +01:00
- Can work on mirror/SPAN ports
2015-03-10 21:06:21 +01:00
- Supports L2TP decapsulation, VLAN untagging and MPLS processing in mirror mode
2014-11-22 14:17:26 +01:00
- Can work on server/soft-router
- Can detect DoS/DDoS in 1-2 seconds
2014-11-22 14:22:35 +01:00
- Tested up to 10GE with 5-6 Mpps on Intel i7 2600 with Intel Nic 82599
2015-01-26 13:11:51 +01:00
- Complete plugin support
2014-11-22 14:17:26 +01:00
2015-01-09 23:53:31 +01:00
Supported platforms:
2015-02-10 11:54:59 +01:00
- Linux (Debian 6/7, CentOS 6/7, Ubuntu 12+)
2015-02-10 14:36:09 +01:00
- FreeBSD 9, 10, 11
2015-02-10 11:54:59 +01:00
- Mac OS X Yosemite
2015-01-09 23:53:31 +01:00
2015-03-10 21:06:21 +01:00
What is "flow" in FastNetMon terms? It's one or multiple udp, tcp, icmp connections with unique src IP, dst IP, src port, dst port and protocol.
2013-10-22 01:29:00 +02:00
2015-03-10 21:06:21 +01:00
Main program screen image:
2014-06-08 12:30:03 +02:00
2014-12-01 10:05:39 +01:00
![Main screen image ](images/fastnetmon_screen.png )
2014-06-08 12:29:37 +02:00
2015-03-10 21:06:21 +01:00
Example for cpu load on Intel i7 2600 with Intel X540/82599 NIC on 400 kpps load:
2014-12-01 10:05:39 +01:00
![Cpu consumption ](images/fastnetmon_stats.png )
2014-06-08 12:29:37 +02:00
2014-11-22 14:17:26 +01:00
Example deployment scheme:
2014-12-01 10:05:39 +01:00
![Network diagramm ](images/network_map.png )
2014-11-14 21:43:00 +01:00
2014-06-08 20:49:25 +02:00
Example of first notification:
```bash
subject: Myflower Guard: IP xx.xx.xx.xx blocked because incoming attack with power 120613 pps
2014-11-22 14:17:26 +01:00
body:
IP: XX.XX.XX.XX
Initial attack power: 98285 packets per second
Peak attack power: 98285 packets per second
Attack direction: outgoing
Incoming traffic: 62 mbps
Outgoing traffic: 65 mbps
Incoming pps: 66628 packets per second
Outgoing pps: 98285 packets per second
Incoming flows: 16
Outgoing flows: 16
Incoming
UDP
xx.xx.xx.xx:33611 < 216.239.32.109:53 729021 bytes 5927 packets
xx.xx.xx.xx:33611 < 216.239.34.109:53 231609 bytes 1883 packets
xx.xx.xx.xx:33611 < 216.239.36.109:53 728652 bytes 5924 packets
xx.xx.xx.xx:33611 < 216.239.38.109:53 414387 bytes 3369 packets
xx.xx.xx.xx:38458 < 216.239.32.109:53 724347 bytes 5889 packets
xx.xx.xx.xx:38458 < 216.239.34.109:53 222753 bytes 1811 packets
xx.xx.xx.xx:38458 < 216.239.36.109:53 729267 bytes 5929 packets
xx.xx.xx.xx:38458 < 216.239.38.109:53 383514 bytes 3118 packets
xx.xx.xx.xx:42279 < 216.239.32.109:53 687201 bytes 5587 packets
xx.xx.xx.xx:42279 < 216.239.34.109:53 248091 bytes 2017 packets
xx.xx.xx.xx:42279 < 216.239.36.109:53 737508 bytes 5996 packets
xx.xx.xx.xx:42279 < 216.239.38.109:53 321276 bytes 2612 packets
xx.xx.xx.xx:51469 < 216.239.32.109:53 735663 bytes 5981 packets
xx.xx.xx.xx:51469 < 216.239.34.109:53 237267 bytes 1929 packets
xx.xx.xx.xx:51469 < 216.239.36.109:53 735663 bytes 5981 packets
xx.xx.xx.xx:51469 < 216.239.38.109:53 318570 bytes 2590 packets
Outgoing
UDP
xx.xx.xx.xx:33611 > 216.239.32.109:53 531309 bytes 6107 packets
xx.xx.xx.xx:33611 > 216.239.34.109:53 531222 bytes 6106 packets
xx.xx.xx.xx:33611 > 216.239.36.109:53 531222 bytes 6106 packets
xx.xx.xx.xx:33611 > 216.239.38.109:53 531222 bytes 6106 packets
xx.xx.xx.xx:38458 > 216.239.32.109:53 527220 bytes 6060 packets
xx.xx.xx.xx:38458 > 216.239.34.109:53 527133 bytes 6059 packets
xx.xx.xx.xx:38458 > 216.239.36.109:53 527133 bytes 6059 packets
xx.xx.xx.xx:38458 > 216.239.38.109:53 527220 bytes 6060 packets
xx.xx.xx.xx:42279 > 216.239.32.109:53 539052 bytes 6196 packets
xx.xx.xx.xx:42279 > 216.239.34.109:53 539052 bytes 6196 packets
xx.xx.xx.xx:42279 > 216.239.36.109:53 539139 bytes 6197 packets
xx.xx.xx.xx:42279 > 216.239.38.109:53 539139 bytes 6197 packets
xx.xx.xx.xx:51469 > 216.239.32.109:53 532701 bytes 6123 packets
xx.xx.xx.xx:51469 > 216.239.34.109:53 532701 bytes 6123 packets
xx.xx.xx.xx:51469 > 216.239.36.109:53 532701 bytes 6123 packets
xx.xx.xx.xx:51469 > 216.239.38.109:53 532788 bytes 6124 packets
2014-06-08 20:49:25 +02:00
```
Example of second notification:
```bash
subject: Myflower Guard: IP xx.xx.xx.xx blocked because incoming attack with power 120613 pps
body:
2014-07-04 12:04:19 +02:00
IP: xx.zz.xx.1
2014-11-22 14:18:43 +01:00
2014-11-21 08:01:11.419798 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419799 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419816 xx.xx.xx.xx:51469 > 216.239.36.109:53 protocol: udp flags: size: 87 bytes
2014-11-21 08:01:11.419837 216.239.38.109:53 > xx.xx.xx.xx:33611 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419838 216.239.34.109:53 > xx.xx.xx.xx:33611 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419859 216.239.38.109:53 > xx.xx.xx.xx:42279 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419877 xx.xx.xx.xx:51469 > 216.239.38.109:53 protocol: udp flags: size: 87 bytes
2014-11-21 08:01:11.419884 216.239.38.109:53 > xx.xx.xx.xx:33611 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419891 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419906 216.239.38.109:53 > xx.xx.xx.xx:33611 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419907 216.239.38.109:53 > xx.xx.xx.xx:42279 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419908 216.239.38.109:53 > xx.xx.xx.xx:42279 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419916 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419917 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419929 216.239.38.109:53 > xx.xx.xx.xx:33611 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419961 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419962 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419963 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
2014-11-21 08:01:11.419963 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
2014-06-08 20:49:25 +02:00
```
2014-12-02 14:42:40 +01:00
2015-03-10 21:06:21 +01:00
To enable sFLOW simply specify IP of server with installed FastNetMon and specify port 6343.