Explanation

The rstflood security event is triggered when the Netography Fusion Portal detects an abnormal frequency of Reset (RST) packets on the network, signaling a potential denial of service (DoS) or distributed denial of service (DDoS) attack. RST packets serve as a mechanism to reset a TCP connection between two endpoints. In an RST flood attack, a malicious actor sends a large volume of RST packets, causing the targeted endpoint to terminate legitimate connections and disrupting its services.

What to Look For

To examine the results of the rstflood event, network administrators should look for a sudden increase in RST packets directed towards a particular protocol on their network. This can be analyzed using the Netography Fusion Portal's traffic search. Furthermore, it is important to investigate the source IP addresses of the incoming RST packets to identify the potential attacker(s) and to implement appropriate measures to prevent the attack. On the endpoint, the administrator should check for any service disruptions that may have been caused by the attack. Overall, by identifying and responding appropriately to rstflood events, network administrators can mitigate the impact of potential DoS/DDoS attacks on their network.

Related MITRE ATT&CK Categories

Network Denial of Service, Technique T1498 - Enterprise