[123798] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: OBESEUS - A new type of DDOS protector

daemon@ATHENA.MIT.EDU (William Pitcock)
Tue Mar 16 05:15:52 2010

From: William Pitcock <nenolod@systeminplace.net>
To: gordslater@ieee.org
In-Reply-To: <1268725982.31837.19.camel@ub-g-d2>
Date: Tue, 16 Mar 2010 04:13:28 -0500
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Tue, 2010-03-16 at 07:53 +0000, gordon b slater wrote:
> Hmm, the "hey! it's open source!" factor doesn't hold much sway in the
> network world, no-one will be amazed at that. Many observers are
> surprised at the amount of free software employed by ISPs and the
> like, but it's certainly no news to insiders. 

Not to mention that it is only "open source for private non-commercial
use only", and is crippled.

Also, Obeseus doesn't seem to be any better then stuff I have made
myself for my own usage and clients' usage.  All it does it look at a
pcap dump and analyze it.

Obeseus is actually worse: it does not work in realtime, the data
structures it uses are not suited to realtime detection, and in a DDoS,
I think this could take several minutes to trigger appropriate events
like IP nullroutes and ACLs etcetera.

The best way to detect DDoS is to run a 30 second rolling average.  If
you're suddenly doing a gigabit inbound within 30 seconds of UDP
traffic, you're probably being DDoSed ;).

William



home help back first fref pref prev next nref lref last post