1
0
mirror of https://github.com/pavel-odintsov/fastnetmon synced 2024-12-03 17:38:25 +01:00
mirror of the fastnetmon repo with rewritten history
Go to file
2015-09-18 14:07:51 +02:00
debian Remove dependency on numa 2015-06-05 12:35:22 +03:00
docs Merge pull request #408 from robertoberto/master 2015-09-14 21:41:38 +03:00
packages notify script using python, removed local exabgp_blackhole 2015-09-10 19:49:42 -03:00
src small typo/grammar fixes 2015-09-18 14:07:51 +02:00
.travis.yml Enable PF_RING kernel module build for all distributions 2015-08-02 23:24:38 +02:00
LICENSE Initial commit 2013-10-18 03:09:53 -07:00
README.md Do not use binary packages now, so buggy :( 2015-09-06 14:56:53 +03:00

FastNetMon

Author: Pavel Odintsov pavel.odintsov at gmail.com Follow my Twitter

Join to maillist Look at road map

Chat: #fastnetmon at irc.freenode.net web client

Please fill survey, we need your voice!

Detailed reference in Russian: link

License: GPLv2

FastNetMon - A high performance DoS/DDoS load analyzer built on top of multiple packet capture engines (NetFlow, IPFIX, sFLOW, SnabbSwitch, netmap, PF_RING, PCAP).

What can we do? We can detect hosts in our own network with a large amount of packets per second/bytes per second or flow per second incoming or outgoing from certain hosts. And we can call an external script which can notify you, switch off a server or blackhole the client.

Build Status Gitter Stories in Progress

Supported packet capture engines:

  • NetFlow v5, v9
  • IPFIX
  • sFLOW v4 (dev branch only), v5
  • Port mirror/SPAN capture with PF_RING (with ZC/DNA mode support need license), SnabbSwitch, NETMAP and PCAP

You could look comparison table for all available packet capture engines.

Features:

  • Complete BGP Flow Spec support, RFC 5575
  • Can process incoming and outgoing traffic
  • Can trigger block script if certain IP loads network with a large amount of packets/bytes/flows per second
  • Thresholds could be configured in per subnet basis with hostgroups feature
  • Could announce blocked IPs to BGP router with ExaBGP
  • Full integration with Graphite and InfluxDB
  • Deep packet inspection for attack traffic
  • netmap support (open source; wire speed processing; only Intel hardware NICs or any hypervisor VM type)
  • SnabbSwitch support (open source, very flexible, LUA driven, very-very-very fast)
  • Could filter out NetFLOW v5 flows or sFLOW packets with script implemented in LUA (useful for port exclude)
  • Supports L2TP decapsulation, VLAN untagging and MPLS processing in mirror mode
  • Can work on server/soft-router
  • Can detect DoS/DDoS in 1-2 seconds
  • Tested up to 10GE with 12 Mpps on Intel i7 3820 with Intel NIC 82599
  • Complete plugin support
  • Could capture attack fingerprint in pcap format
  • Have complete support for most popular attack types

Supported platforms:

  • Linux (Debian 6/7/8, CentOS 6/7, Ubuntu 12+)
  • FreeBSD 9, 10, 11
  • Mac OS X Yosemite

Supported architectures:

  • x86 64 bit (recommended)
  • x86 32 bit

Router integration instructions:

What is "flow" in FastNetMon terms? It's one or multiple udp, tcp, icmp connections with unique src IP, dst IP, src port, dst port and protocol.

Main program screen image:

Main screen image

Example for cpu load on Intel i7 2600 with Intel X540/82599 NIC on 400 kpps load: Cpu consumption

Example deployment scheme: Network diagramm

Example of notification email about detected attack.

To enable sFLOW simply specify IP of server with installed FastNetMon and specify port 6343. To enable netflow simply specify IP of server with installed FastNetMon and specify port 2055.

Why did we write this? Because we can't find any software for solving this problem in the open source world!

How I can help project?

  • We are looking for maintainer for Debian and Fedora/EPEL packages
  • Test it!
  • Share your experience
  • Share your use cases
  • Share your improvements
  • Test it with different equipment
  • Create feature requests