[121864] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DDoS mitigation recommendations

daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Fri Jan 29 00:01:47 2010

From: "Dobbins, Roland" <rdobbins@arbor.net>
To: NANOG list <nanog@nanog.org>
Date: Fri, 29 Jan 2010 05:01:19 +0000
In-Reply-To: <1264732760-sup-399@sfo.thejof.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Jan 29, 2010, at 10:04 AM, Jonathan Lassoff wrote:

> Something utilizing sflow/netflow and flowspec to block or direct traffic=
 into a scrubbing box gets you much better bang for your buck past a certai=
n scale.

This is absolutely key for packet-flooding types of attacks, and other atta=
cks in which unadulterated pathological traffic can be detected/classified =
in detail, with minimal collateral damage.  Everyone should implement S/RTB=
H and/or flow-spec whenever possible, this cannot be emphasized enough.  Op=
erators have made significant investments in high-speed, ASIC-powered route=
rs at their edges; there's no reason not to utilize that horsepower, as it'=
s already there and paid for.

For situations in which valid and invalid traffic are highly intermixed, an=
d/or layer-4/-7 heuristics are key in validating  legitimate traffic and in=
validating undesirable traffic, the additional capabilities of an IDMS whic=
h can perform such discrimination can be of benefit.  As mentioned in a pre=
vious thread, it's possible to construct a base-level capability using open=
-source software, and commercial solutions from various vendors [full discl=
osure: I'm employed one of said vendors] are available, as well.

-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

    Injustice is relatively easy to bear; what stings is justice.

                        -- H.L. Mencken





home help back first fref pref prev next nref lref last post