Here's another way to parse the socket lines:
my ($prot,$recv_q,$send_q,$laddr,$lport,$eaddr,$eport,$status,$syn) =
map {split ':'} split " ";
You could also take another approach to forking the netstat process. Use magical open to make netstat's STDOUT pipe to a handle in the parent, and process the lines as you read them:
open NETSTAT, '-|', '/bin/netstat', '-na' or die $!;
while (<NETSTAT>) {
next if /^Active/ or /^\s+Proto/ or /^$/;
my @sockdata = map {split ':'} split " ";
print "$/Warning: SYN! I think we're being SYN'ed$/$/"
if $sockdata[7] =~ /syn/i;
printf "Local: %s:%s - External: %s:%s - %s$/", @sockdata[3..7];
}
You could keep the SYN matches, and recheck after a little sleep to verify SYN flood attacks.
Update: Corrected code to match my netstat output.
After Compline,
Zaxo
-
Are you posting in the right place? Check out Where do I post X? to know for sure.
-
Posts may use any of the Perl Monks Approved HTML tags. Currently these include the following:
<code> <a> <b> <big>
<blockquote> <br /> <dd>
<dl> <dt> <em> <font>
<h1> <h2> <h3> <h4>
<h5> <h6> <hr /> <i>
<li> <nbsp> <ol> <p>
<small> <strike> <strong>
<sub> <sup> <table>
<td> <th> <tr> <tt>
<u> <ul>
-
Snippets of code should be wrapped in
<code> tags not
<pre> tags. In fact, <pre>
tags should generally be avoided. If they must
be used, extreme care should be
taken to ensure that their contents do not
have long lines (<70 chars), in order to prevent
horizontal scrolling (and possible janitor
intervention).
-
Want more info? How to link
or How to display code and escape characters
are good places to start.