[116581] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Botnet hunting resources (was: Re: DOS in progress ?)

daemon@ATHENA.MIT.EDU (Roland Dobbins)
Sat Aug 8 01:44:12 2009

From: Roland Dobbins <rdobbins@arbor.net>
To: NANOG list <nanog@nanog.org>
In-Reply-To: <m3iqgysy1c.fsf@luke.xen.prgmr.com>
Date: Sat, 8 Aug 2009 12:45:29 +0700
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Aug 8, 2009, at 11:57 AM, Luke S Crawford wrote:

> 2. is there a standard way to push a null-route on the attackers  
> source IP upstream?

Sure - if you apply loose-check uRPF (and/or strict-check, when you  
can do so) on Cisco or Juniper routers, you can combine that with the  
blackhole to give you a source-based remotely-triggered blackhole, or  
S/RTBH.  You can do this at your edges, and you *may* be able to  
arrange it with other networks with whom you connect (i.e., scope  
limited to your link with them).

Combine that with the other standard architectural and hardening BCPs,  
along with the DNS BCPs, and you'll be much better prepared to detect,  
classify, traceback, and mitigate attacks.  The key is to ensure  
you're making use of hardware-based routers which can handle high pps.

-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

         Unfortunately, inefficiency scales really well.

		   -- Kevin Lawton



home help back first fref pref prev next nref lref last post