nanog mailing list archives

Re: Effective ways to deal with DDoS attacks?


From: Iljitsch van Beijnum <iljitsch () muada com>
Date: Thu, 2 May 2002 15:57:52 +0200 (CEST)


On Thu, 2 May 2002, Avleen Vig wrote:

Basically, it works like this: when you identify the target of the attack,
you have traffic for those target addresses rerouted to a "filter box".
This filter box then contains source address based filters to get rid of
the attacking traffic.

Two questions:
  1) How do you plan on determining what an allowed src address and what
     isn't?

"allowed"?

  2) Secondly, how would you deal with spoofed src addresses where the src
     address is rarely repeated in the attack?

If that is the case, this solution won't help. Unfortunately, it is
impossilbe to prevent traffic with spoofed source addresses to come in
over transit connections. However, it is doable to make sure traffic
coming in from peers uses source addresses that belong to peers. So for
networks large enough to have a major part of their traffic coming in over
peering rather than transit, there are possibilities.


Current thread: