[133301] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Over a decade of DDOS--any progress yet?

daemon@ATHENA.MIT.EDU (Arturo Servin)
Wed Dec 8 10:48:19 2010

From: Arturo Servin <arturo.servin@gmail.com>
In-Reply-To: <AANLkTimaaaa7dTUS4=BGobCHuGMgT=Lyn-vVPgbA0cGm@mail.gmail.com>
Date: Wed, 8 Dec 2010 13:47:50 -0200
To: Jeffrey Lyon <jeffrey.lyon@blacklotus.net>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


	And those are much more complex to detect than SYN attacks or =
simple flood attacks with ICMP.

	But even for simple flood attacks, I still think that the target =
has very few defence mechanisms, and those that exists require a complex =
coordination with upstreams.

Cheers,
.as

On 8 Dec 2010, at 13:39, Jeffrey Lyon wrote:

> We have seen a recent trend of attackers "legitimately" purchasing
> servers to use for attacks. They'll setup a front company, attempt to
> make the traffic look legitimate, and then launch attacks from their
> "legitimate" botnet.
>=20
> Jeff
>=20
> On Wed, Dec 8, 2010 at 10:33 AM, Arturo Servin =
<arturo.servin@gmail.com> wrote:
>>=20
>> On 8 Dec 2010, at 13:12, nanog-request@nanog.org wrote:
>>=20
>>> Date: Wed, 8 Dec 2010 12:53:51 +0000
>>> From: "Dobbins, Roland" <rdobbins@arbor.net>
>>> Subject: Re: Over a decade of DDOS--any progress yet?
>>> To: North American Operators' Group <nanog@nanog.org>
>>> Message-ID: <BF571AD7-1122-407B-B7FA-77B9BBAC48F7@arbor.net>
>>> Content-Type: text/plain; charset=3D"us-ascii"
>>>=20
>>>=20
>>> On Dec 8, 2010, at 7:28 PM, Arturo Servin wrote:
>>>=20
>>>>      One big problem (IMHO) of DDoS is that sources (the host of =
botnets) may be completely unaware that they are part of a DDoS. I do =
not mean the bot machine, I mean the ISP connecting those.
>>>=20
>>> The technology exists to detect and classify this attack traffic, =
and is deployed in production networks today.
>>=20
>>        Yes, they do exist. But, is people really filtering out =
attacks or just watching the attacks going out?
>>=20
>>=20
>>>=20
>>> And of course, the legitimate owners of the botted hosts are =
generally unaware that their machine is being used for nefarious =
purposes.
>>>=20
>>>>      In the other hand the target of a DDoS cannot do anything to =
stop to attack besides adding more BW or contacting one by one the whole =
path of providers to try to minimize the effect.
>>>=20
>>> Actually, there're lots of things they can do.
>>=20
>>        Yes, but all of them rely on your upstreams or in mirroring =
your content. If 100 Mbps are reaching your input interface of 10Mbps =
there is not much that you can do.
>>=20
>>>=20
>>>>      I know that this has many security concerns, but would it be =
good a signalling protocol between ISPs to inform the sources of a DDoS =
attack in order to take semiautomatic actions to rate-limit the traffic =
as close as the source? Of course that this is more complex that these =
three or two lines, but I wonder if this has been considerer in the =
past.
>>>=20
>>> It already exists.
>>=20
>>        If you have an URL would be good. I only found a few research =
papers on the topic and RSVP documents but nothing really concrete.
>>=20
>> Regards,
>> -as
>=20
>=20
>=20
> --=20
> Jeffrey Lyon, Leadership Team
> jeffrey.lyon@blacklotus.net | http://www.blacklotus.net
> Black Lotus Communications - AS32421
> First and Leading in DDoS Protection Solutions



home help back first fref pref prev next nref lref last post