Using ClickHouse for Real-Time L7 DDoS & Bot Traffic Analytics with Tempesta FW
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求很明确,不需要以“文章内容总结”这样的开头,直接写描述即可。 首先,我得仔细阅读这篇文章。文章主要讨论了现有的开源L7 DDoS缓解和bot防护方法的不足之处,这些方法依赖于挑战机制或静态规则,容易被现代工具绕过。然后,作者提出了一种新的方法,使用ClickHouse进行实时HTTP请求分类,并介绍了WebShield这个工具。 接下来,我需要提取关键点:现有的方法失效、新方法使用ClickHouse实时分析、WebShield的功能包括检测异常、自动分类和阻断恶意客户端。此外,还提到了新的TLS指纹方法和WebShield的有效性。 现在要将这些信息浓缩到100字以内。要注意逻辑连贯,涵盖主要技术点和工具名称。可能的结构是先说明现有问题,然后介绍新方法和工具功能。 最后检查字数是否符合要求,并确保语言简洁明了。 </think> 文章提出了一种基于ClickHouse实时分析HTTP请求的新方法来应对L7 DDoS攻击和bot防护问题。通过从Tempesta FW收集日志并利用WebShield工具检测异常流量、分类客户端并自动阻断恶意IP或指纹,该方案有效应对大规模botnet攻击。 2025-12-3 19:3:9 Author: www.reddit.com(查看原文) 阅读量:4 收藏

Most open-source L7 DDoS mitigation and bot-protection approaches rely on challenges (e.g., CAPTCHA or JavaScript proof-of-work) or static rules based on the User-Agent, Referer, or client geolocation. These techniques are increasingly ineffective, as they are easily bypassed by modern open-source impersonation libraries and paid cloud proxy networks.

We explore a different approach: classifying HTTP client requests in near real time using ClickHouse as the primary analytics backend.

We collect access logs directly from Tempesta FW, a high-performance open-source hybrid of an HTTP reverse proxy and a firewall. Tempesta FW implements zero-copy per-CPU log shipping into ClickHouse, so the dataset growth rate is limited only by ClickHouse bulk ingestion performance - which is very high.

WebShield, a small open-source Python daemon:

  • periodically executes analytic queries to detect spikes in traffic (requests or bytes per second), response delays, surges in HTTP error codes, and other anomalies;

  • upon detecting a spike, classifies the clients and validates the current model;

  • if the model is validated, automatically blocks malicious clients by IP, TLS fingerprints, or HTTP fingerprints.

To simplify and accelerate classification — whether automatic or manual — we introduced a new TLS fingerprinting method.

WebShield is a small and simple daemon, yet it is effective against multi-thousand-IP botnets.

The full article with configuration examples, ClickHouse schemas, and queries.


文章来源: https://www.reddit.com/r/netsec/comments/1pdd7gt/using_clickhouse_for_realtime_l7_ddos_bot_traffic/
如有侵权请联系:admin#unsafe.sh