Triggers in QoE
Triggers are used to search for data in QoE Stor according to the specified parameters. After the trigger is fired, one of the following actions is possible:
-
HTTP action
sending email
Required SSG options:
Required additional modules:
Trigger configuration example: Finding the source of a Flood DDOS attack
Trigger name «Source of DDoS», days of week – all, check frequency – every hour, number of positives – once, time and date of start/end - not specified.
Every day, once an hour, a check will be carried out according to the conditions described below.
Queries
Add a field
Name: A
Choose a table to be scanned: Raw full netflow → Tables → Attacks detection → Top hosts IPs → Maxi
Set the period from: «now – 15minute», until : «now»
In this case, the traffic analysis for the selected page will be carried out for the period of the last 15 minutes.
Conditions
We have set a condition — the trigger will fire when it detects both signs: sessions with lifetime equal or less than 20ms AND more than 1500 sessions from one IP-host.
Error handling
In this configuration — if there are no errors, no data will be saved; if any, information will be saved in the form of a table containing suspicious sessions.
Actions
E-mail
With this setting, when the trigger is fired, all information about the event will be sent to the specified email: ID, trigger name, status, link to the report (saved state).
Notification
You can get a link to the report in the notification menu
Select notification
Select - "Details"
Follow the link to the report - it will open in a new tab.
HTTP
It is important to understand: the number of established sessions, the number of incoming packets, etc. are averaged. More precise configuration should be made taking into account the specifics of your network.
Trigger configuration example: Finding the target of a Flood DDOS attack
It differs from the previous example in setting 2 and 3 stages (Queries and Conditions).
Queries
In the "Report" field choose Raw full netflow → Tables → Attacks detection → Top subscribers → Maxi
Conditions
Serie — "Flow volume to subscribers", >= 10000
It is important to understand: the number of established sessions, the number of incoming packets, etc. are averaged. More precise configuration should be made taking into account the specifics of your network.
BotNet Analysis
It differs from the previous example in setting 2 and 3 stages (Queries and Conditions).
Queries
Conditions
Most often, BotNet uses ports 6667 and 1080 — add each destination/source port by selecting query "B" with value "OR" and choose Flow Pcts/s equal or more than 2000.
With this configuration, if at least on one of the ports (6667/1080) the number of passing packets is more than 2000 per second, the trigger will fire.
It is important to understand: the number of established sessions, the number of incoming packets, etc. are averaged. More precise configuration should be made taking into account the specifics of your network.
Subscriber's interest in competitor resources
Trigger name «Subscriber's interest in competitor resources», days of week – all, check frequency – every hour, number of positives – once, time and date of start/end - not specified.
Every day, once an hour, a check will be carried out according to the conditions described below.
Queries
Add "+" field
Name А
Choose a table to be scanned: Raw clickstream → Tables → Raw clickstream
Name B
Choose a table to be scanned: Raw full netflow → Tables → Attacks detection → Top hosts IPs → Maxi
Set the period from: "now – 1 hour", until : "now"
In this case, the traffic analysis for the selected tables will be carried out every hour.
Conditions
Add "+" 3 fields
First field — choose table "А"; Bind – "OR"; Function – "avg"; Serie Host = *megafon.com (or any other competitor ISP)
Second field — choose table "B"; Bind "AND"; Function – "avg"; Serie Flow volume from subscriber, Pct/s >= 800
We have set a condition — the trigger will fire at least 800 packets (not an accidental but meaningful visits) from a subscriber to a competitor's site.
Error handling
In this configuration — if there are no errors, no data will be saved; if any, information will be saved in the form of a table containing suspicious sessions.
Actions
E-mail
With this setting, when the trigger is fired, all information about the event will be sent to the specified email: ID, trigger name, status, link to the report (saved state).
Notification
You can get a link to the report in the notification menu
Select notification
Select — "Details"
Follow the link to the report — it will open in a new tab.
HTTP
It is important to understand: the number of established sessions, the number of incoming packets, etc. are averaged. More precise configuration should be made taking into account the specifics of your network.