[120828] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: D/DoS mitigation hardware/software needed.

daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Tue Jan 5 00:53:22 2010

From: "Dobbins, Roland" <rdobbins@arbor.net>
To: NANOG list <nanog@nanog.org>
Date: Tue, 5 Jan 2010 05:47:05 +0000
In-Reply-To: <005501ca8dc9$7e43b5b0$7acb2110$@net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Jan 5, 2010, at 12:39 PM, Stefan Fouant wrote:

> The trick is to try to automate as much around the process as possible - =
I've worked in environments where just making little changes to incident ha=
ndling response methods reduced the time to mitigate an attack from hours t=
o minutes, all the while still requiring an operator to press the "big red =
button" to offramp and enable the mitigation.

Concur 100% - and when the end-customer is under attack and screaming, this=
 reduction in time to detect/classify/traceback/mitigate makes all the diff=
erence.

Your very salient comments highlight the paramount importance of preparatio=
n as the key enabling phase of the six-phase security incident-handling met=
hodology:

1.	Preparation.

2.	Detection/identification.

3.	Classification.

4.	Traceback.

5.	Reaction.

6.	Post-mortem (feeding lessons learned back into the Preparation phase).

-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

    Injustice is relatively easy to bear; what stings is justice.

                        -- H.L. Mencken





home help back first fref pref prev next nref lref last post