Prevention of DOS Attacks#
The following list shows measures implemented in VOSS Automate to protect the system against Denial of Service (DOS) attacks:
Firewall protection:
TCP flood protection against:
the SSH port
web server ports
SYN flood protection
Configurable session limits for the VOSS Automate platform SSH access is Sessions per user and Sessions per application. An administrator can set and modify the number of SSH sessions allowed:
system-wide (default is 10 if not set)
for a user (default is 10 if not set)
See SSH Session Limit for detailed information.
The usage of ports, protocols, and services are registered with the DoD PPS Database
An automated, continuous on-line monitoring of the system is implemented, with:
Audit trail creation capability in a format that a log viewing application can immediately alert personnel of any unusual or inappropriate activity with potential Information Assurance (IA) implications.
A command line command that a user can automatically disable the system if serious IA violations are detected.
Applications are monitored and notifications sent when resource conditions reach a predefined threshold indicating there may be attack occurring, for example through SNMP traps and triggers.
High disk utilization is managed due to error notifications. For log files, disk utilization is managed by:
daily log rotation
4 weeks of backlogs
the creation of new (empty) log files after rotating old ones
log file compression
a logging restriction of 20 messages per minute
A continuous cycle of updating packages during releases is in place with notifications during updates. Commands to carry out a security check or update can be run at any time.