<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DDoS Attack Using SSDP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ddos-attack-using-ssdp/m-p/2576884#M205607</link>
    <description>&lt;P&gt;For the last one month we have been hit by DDOS attacks that seem to be using SSDP (Port 1900 UPD). It’s just happed today and it lasted 15 mins…during which time our internet connection (Comcast Business line. 100/20 MB) came to a crawl. No one could access anything on the net.&lt;/P&gt;&lt;P&gt;How can I mitigate this attacks…. I have configured the ASA 5510 like this&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;ip audit name OUTSIDE_ATTACK attack action alarm drop&lt;/P&gt;&lt;P&gt;ip audit name OUTSIDE_INFO info action alarm&lt;/P&gt;&lt;P&gt;ip audit name INSIDE_ATTACK attack action alarm drop reset&lt;/P&gt;&lt;P&gt;ip audit name INSIDE_INFO info action alarm&lt;/P&gt;&lt;P&gt;ip audit interface outside OUTSIDE_INFO&lt;/P&gt;&lt;P&gt;ip audit interface outside OUTSIDE_ATTACK&lt;/P&gt;&lt;P&gt;ip audit interface inside INSIDE_INFO&lt;/P&gt;&lt;P&gt;ip audit interface inside INSIDE_ATTACK&lt;/P&gt;&lt;P&gt;ip audit signature 1002 disable&lt;/P&gt;&lt;P&gt;ip audit signature 2000 disable&lt;/P&gt;&lt;P&gt;ip audit signature 2001 disable&lt;/P&gt;&lt;P&gt;ip audit signature 2004 disable&lt;/P&gt;&lt;P&gt;ip audit signature 2005 disable&lt;/P&gt;&lt;P&gt;ip audit signature 6051 disable&lt;/P&gt;&lt;P&gt;ip audit signature 6053 disable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other tricks. More more information attacked&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ATTACK Partial log.&lt;/P&gt;&lt;P&gt;Here is a sample of some logs I captured.&lt;/P&gt;&lt;P&gt;&amp;nbsp; 51: 11:08:44.495228 183.203.151.166.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 320&lt;/P&gt;&lt;P&gt;&amp;nbsp; 52: 11:08:44.495244 27.203.166.105.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 326&lt;/P&gt;&lt;P&gt;&amp;nbsp; 53: 11:08:44.498158 111.39.184.120.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 288&lt;/P&gt;&lt;P&gt;&amp;nbsp; 54: 11:08:44.501896 98.228.91.18.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 245&lt;/P&gt;&lt;P&gt;&amp;nbsp; 55: 11:08:44.501927 221.210.161.54.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 268&lt;/P&gt;&lt;P&gt;&amp;nbsp; 56: 11:08:44.502690 81.167.61.109.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 286&lt;/P&gt;&lt;P&gt;&amp;nbsp; 57: 11:08:44.503468 96.35.27.211.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 247&lt;/P&gt;&lt;P&gt;&amp;nbsp; 58: 11:08:44.503498 111.39.184.120.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 268&lt;/P&gt;&lt;P&gt;&amp;nbsp; 59: 11:08:44.503529 76.16.192.25.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 307&lt;/P&gt;&lt;P&gt;&amp;nbsp; 60: 11:08:44.504414 46.19.66.66.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 307&lt;/P&gt;&lt;P&gt;&amp;nbsp; 61: 11:08:44.504444 76.173.58.15.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 284&lt;/P&gt;&lt;P&gt;&amp;nbsp; 62: 11:08:44.505878 2.49.240.153.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 317&lt;/P&gt;&lt;P&gt;&amp;nbsp; 63: 11:08:44.505924 60.208.123.210.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 314&lt;/P&gt;&lt;P&gt;&amp;nbsp; 64: 11:08:44.506748 70.95.161.23.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 245&lt;/P&gt;&lt;P&gt;&amp;nbsp; 65: 11:08:44.507694 121.206.190.17.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 268&lt;/P&gt;&lt;P&gt;&amp;nbsp; 66: 11:08:44.507725 111.39.184.120.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 242&lt;/P&gt;&lt;P&gt;&amp;nbsp; 67: 11:08:44.507740 121.206.190.17.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 290&lt;/P&gt;&lt;P&gt;&amp;nbsp; 68: 11:08:44.507770 192.251.249.83.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 302&lt;/P&gt;&lt;P&gt;&amp;nbsp; 69: 11:08:44.508488 58.210.95.138.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 326&lt;/P&gt;&lt;P&gt;&amp;nbsp; 70: 11:08:44.508518 58.210.95.138.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 314&lt;/P&gt;&lt;P&gt;&amp;nbsp; 71: 11:08:44.509342 71.95.40.47.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 305&lt;/P&gt;&lt;P&gt;&amp;nbsp; 72: 11:08:44.509418 121.206.190.17.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 326&lt;/P&gt;&lt;P&gt;&amp;nbsp; 73: 11:08:44.509434 70.95.161.23.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 323&lt;/P&gt;&lt;P&gt;&amp;nbsp; 74: 11:08:44.509449 71.95.40.47.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 307&lt;/P&gt;&lt;P&gt;&amp;nbsp; 75: 11:08:44.509464 81.200.247.20.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 291&lt;/P&gt;&lt;P&gt;&amp;nbsp; 76: 11:08:44.510898 59.45.34.2.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 268&lt;/P&gt;&lt;P&gt;&amp;nbsp; 77: 11:08:44.510929 84.208.252.214.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 234&lt;/P&gt;&lt;P&gt;&amp;nbsp; 78: 11:08:44.510959 76.173.58.15.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 229&lt;/P&gt;&lt;P&gt;&amp;nbsp; 79: 11:08:44.510975 46.19.66.66.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 305&lt;/P&gt;&lt;P&gt;&amp;nbsp; 80: 11:08:44.511097 186.68.236.141.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 300&lt;/P&gt;&lt;P&gt;&amp;nbsp; 81: 11:08:44.511966 74.58.171.63.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 307&lt;/P&gt;&lt;P&gt;&amp;nbsp; 82: 11:08:44.511997 111.39.184.120.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 290&lt;/P&gt;&lt;P&gt;&amp;nbsp; 83: 11:08:44.512012 123.55.81.145.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 326&lt;/P&gt;&lt;P&gt;&amp;nbsp; 84: 11:08:44.512043 1.189.11.236.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 322&lt;/P&gt;&lt;P&gt;&amp;nbsp; 85: 11:08:44.512851 110.53.148.27.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 314&lt;/P&gt;&lt;P&gt;&amp;nbsp; 86: 11:08:44.512897 110.53.148.27.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 242&lt;/P&gt;&lt;P&gt;&amp;nbsp; 87: 11:08:44.512912 221.215.155.162.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 268&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:59:48 GMT</pubDate>
    <dc:creator>stevechege</dc:creator>
    <dc:date>2019-03-12T04:59:48Z</dc:date>
    <item>
      <title>DDoS Attack Using SSDP</title>
      <link>https://community.cisco.com/t5/network-security/ddos-attack-using-ssdp/m-p/2576884#M205607</link>
      <description>&lt;P&gt;For the last one month we have been hit by DDOS attacks that seem to be using SSDP (Port 1900 UPD). It’s just happed today and it lasted 15 mins…during which time our internet connection (Comcast Business line. 100/20 MB) came to a crawl. No one could access anything on the net.&lt;/P&gt;&lt;P&gt;How can I mitigate this attacks…. I have configured the ASA 5510 like this&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;ip audit name OUTSIDE_ATTACK attack action alarm drop&lt;/P&gt;&lt;P&gt;ip audit name OUTSIDE_INFO info action alarm&lt;/P&gt;&lt;P&gt;ip audit name INSIDE_ATTACK attack action alarm drop reset&lt;/P&gt;&lt;P&gt;ip audit name INSIDE_INFO info action alarm&lt;/P&gt;&lt;P&gt;ip audit interface outside OUTSIDE_INFO&lt;/P&gt;&lt;P&gt;ip audit interface outside OUTSIDE_ATTACK&lt;/P&gt;&lt;P&gt;ip audit interface inside INSIDE_INFO&lt;/P&gt;&lt;P&gt;ip audit interface inside INSIDE_ATTACK&lt;/P&gt;&lt;P&gt;ip audit signature 1002 disable&lt;/P&gt;&lt;P&gt;ip audit signature 2000 disable&lt;/P&gt;&lt;P&gt;ip audit signature 2001 disable&lt;/P&gt;&lt;P&gt;ip audit signature 2004 disable&lt;/P&gt;&lt;P&gt;ip audit signature 2005 disable&lt;/P&gt;&lt;P&gt;ip audit signature 6051 disable&lt;/P&gt;&lt;P&gt;ip audit signature 6053 disable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other tricks. More more information attacked&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ATTACK Partial log.&lt;/P&gt;&lt;P&gt;Here is a sample of some logs I captured.&lt;/P&gt;&lt;P&gt;&amp;nbsp; 51: 11:08:44.495228 183.203.151.166.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 320&lt;/P&gt;&lt;P&gt;&amp;nbsp; 52: 11:08:44.495244 27.203.166.105.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 326&lt;/P&gt;&lt;P&gt;&amp;nbsp; 53: 11:08:44.498158 111.39.184.120.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 288&lt;/P&gt;&lt;P&gt;&amp;nbsp; 54: 11:08:44.501896 98.228.91.18.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 245&lt;/P&gt;&lt;P&gt;&amp;nbsp; 55: 11:08:44.501927 221.210.161.54.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 268&lt;/P&gt;&lt;P&gt;&amp;nbsp; 56: 11:08:44.502690 81.167.61.109.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 286&lt;/P&gt;&lt;P&gt;&amp;nbsp; 57: 11:08:44.503468 96.35.27.211.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 247&lt;/P&gt;&lt;P&gt;&amp;nbsp; 58: 11:08:44.503498 111.39.184.120.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 268&lt;/P&gt;&lt;P&gt;&amp;nbsp; 59: 11:08:44.503529 76.16.192.25.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 307&lt;/P&gt;&lt;P&gt;&amp;nbsp; 60: 11:08:44.504414 46.19.66.66.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 307&lt;/P&gt;&lt;P&gt;&amp;nbsp; 61: 11:08:44.504444 76.173.58.15.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 284&lt;/P&gt;&lt;P&gt;&amp;nbsp; 62: 11:08:44.505878 2.49.240.153.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 317&lt;/P&gt;&lt;P&gt;&amp;nbsp; 63: 11:08:44.505924 60.208.123.210.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 314&lt;/P&gt;&lt;P&gt;&amp;nbsp; 64: 11:08:44.506748 70.95.161.23.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 245&lt;/P&gt;&lt;P&gt;&amp;nbsp; 65: 11:08:44.507694 121.206.190.17.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 268&lt;/P&gt;&lt;P&gt;&amp;nbsp; 66: 11:08:44.507725 111.39.184.120.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 242&lt;/P&gt;&lt;P&gt;&amp;nbsp; 67: 11:08:44.507740 121.206.190.17.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 290&lt;/P&gt;&lt;P&gt;&amp;nbsp; 68: 11:08:44.507770 192.251.249.83.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 302&lt;/P&gt;&lt;P&gt;&amp;nbsp; 69: 11:08:44.508488 58.210.95.138.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 326&lt;/P&gt;&lt;P&gt;&amp;nbsp; 70: 11:08:44.508518 58.210.95.138.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 314&lt;/P&gt;&lt;P&gt;&amp;nbsp; 71: 11:08:44.509342 71.95.40.47.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 305&lt;/P&gt;&lt;P&gt;&amp;nbsp; 72: 11:08:44.509418 121.206.190.17.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 326&lt;/P&gt;&lt;P&gt;&amp;nbsp; 73: 11:08:44.509434 70.95.161.23.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 323&lt;/P&gt;&lt;P&gt;&amp;nbsp; 74: 11:08:44.509449 71.95.40.47.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 307&lt;/P&gt;&lt;P&gt;&amp;nbsp; 75: 11:08:44.509464 81.200.247.20.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 291&lt;/P&gt;&lt;P&gt;&amp;nbsp; 76: 11:08:44.510898 59.45.34.2.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 268&lt;/P&gt;&lt;P&gt;&amp;nbsp; 77: 11:08:44.510929 84.208.252.214.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 234&lt;/P&gt;&lt;P&gt;&amp;nbsp; 78: 11:08:44.510959 76.173.58.15.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 229&lt;/P&gt;&lt;P&gt;&amp;nbsp; 79: 11:08:44.510975 46.19.66.66.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 305&lt;/P&gt;&lt;P&gt;&amp;nbsp; 80: 11:08:44.511097 186.68.236.141.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 300&lt;/P&gt;&lt;P&gt;&amp;nbsp; 81: 11:08:44.511966 74.58.171.63.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 307&lt;/P&gt;&lt;P&gt;&amp;nbsp; 82: 11:08:44.511997 111.39.184.120.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 290&lt;/P&gt;&lt;P&gt;&amp;nbsp; 83: 11:08:44.512012 123.55.81.145.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 326&lt;/P&gt;&lt;P&gt;&amp;nbsp; 84: 11:08:44.512043 1.189.11.236.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 322&lt;/P&gt;&lt;P&gt;&amp;nbsp; 85: 11:08:44.512851 110.53.148.27.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 314&lt;/P&gt;&lt;P&gt;&amp;nbsp; 86: 11:08:44.512897 110.53.148.27.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 242&lt;/P&gt;&lt;P&gt;&amp;nbsp; 87: 11:08:44.512912 221.215.155.162.1900 &amp;gt; 50.XXX.XXX.XXX.80:&amp;nbsp; udp 268&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:59:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ddos-attack-using-ssdp/m-p/2576884#M205607</guid>
      <dc:creator>stevechege</dc:creator>
      <dc:date>2019-03-12T04:59:48Z</dc:date>
    </item>
    <item>
      <title>Hi,I think the most effective</title>
      <link>https://community.cisco.com/t5/network-security/ddos-attack-using-ssdp/m-p/2576885#M205608</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think the most effective way to prevent this attack would be to block this Destination UDP port on the ISP end itself if this is recurring.&lt;/P&gt;&lt;P&gt;Also , on the ASA device , we can set the per client max limit for this destination server , it should also help you on this issue.&lt;/P&gt;&lt;P&gt;As the destination IP's are different , SHUN might not be that effective.&lt;/P&gt;&lt;P&gt;For more information:-&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa80/configuration/guide/conf_gd/protect.html#wp1080691&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2014 02:57:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ddos-attack-using-ssdp/m-p/2576885#M205608</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-28T02:57:01Z</dc:date>
    </item>
  </channel>
</rss>

