[120822] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: D/DoS mitigation hardware/software needed.

daemon@ATHENA.MIT.EDU (Stefan Fouant)
Tue Jan 5 00:35:27 2010

From: "Stefan Fouant" <sfouant@shortestpathfirst.net>
To: "'Rick Ernst'" <nanog@shreddedmail.com>,
	"'Dobbins, Roland'" <rdobbins@arbor.net>
In-Reply-To: <d066472f1001042119y2467638bt88c650f785d4a7f0@mail.gmail.com>
Date: Tue, 5 Jan 2010 00:34:34 -0500
Cc: 'NANOG list' <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

> -----Original Message-----
> From: Rick Ernst [mailto:nanog@shreddedmail.com]
> Sent: Tuesday, January 05, 2010 12:19 AM
> 
> I'd argue just the opposite.  If your monitoring/mitigation system
> changes
> dependent on the situation (normal vs under attack), you are adding
> complexity to the system.  "What mode is the system in right now? Is
> this
> customer having connectivity issues because of a state change in the
> network? etc."

Almost all of the scalable DDoS mitigation architectures deployed in
carriers or other large enterprises employ the use of an offramp method.
These devices perform a lot better when you can forward just the subset of
the traffic through as opposed to all.  It just a simple matter of using
static routing / RTBH techniques / etc. to automate the offramp.

Stefan Fouant, CISSP, JNCIE-M/T
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D



home help back first fref pref prev next nref lref last post