slpreflection

Explanation

This security event in the Netography Fusion Portal is designed to detect SLP reflection attacks. SLP, short for Service Location Protocol, can be used by attackers to amplify DDoS attacks. In a SLP reflection attack, the attacker sends UDP packets with spoofed source addresses to a vulnerable server running the SLP protocol, which will then respond with a much larger packet to the target IP address.

What to Look For

When examining the results of the slpreflection security event, look for anomalous network traffic patterns involving UDP packets. Specifically, look for large amounts of traffic from a single source address, which may indicate a potential SLP reflection attack. Additionally, check any servers or endpoints on the network running the SLP protocol for signs of exploitation, such as high CPU or memory usage.

If a SLP reflection attack is detected, take immediate steps to block the malicious traffic. If hosts on your network are being used as reflection amplifiers, take action to deactivate vulnerable services, or block access to those systems from the internet.

*Related MITRE ATT&CK CategoriesNetwork Denial of Service, Technique T1498 - Enterprise