[177247] in North American Network Operators' Group
Re: DDOS solution recommendation
daemon@ATHENA.MIT.EDU (Paul S.)
Sun Jan 11 00:06:22 2015
X-Original-To: nanog@nanog.org
Date: Sun, 11 Jan 2015 14:05:25 +0900
From: "Paul S." <contact@winterei.se>
To: nanog@nanog.org
In-Reply-To: <BE5E09F7-08D6-4631-ACFD-7280C8446B6D@arbor.net>
Errors-To: nanog-bounces@nanog.org
Very true.
Last year's Atrato outages in NY come to mind on this one.
On 1/11/2015 午後 01:51, Roland Dobbins wrote:
> On Jan 11, 2015, at 11:37 AM, Paul S. <contact@winterei.se> wrote:
>
>> Obviously, concerns are different if you're an enterprise that's a DDoS magnet -- but for general service providers selling 'protected services,' food for thought.
> Actually, bystander traffic is all-too-often affected by these very large reflection/amplification attacks, because they fill up peering/transit links:
>
> <https://app.box.com/s/r7an1moswtc7ce58f8gg>
>
> [Full disclosure: I work for a provider of IDMS solutions, but there's no vendor propaganda in the above-linked .pdf preso.]
>
> ----------------------------------------------------------------------
> Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>
>
> Equo ne credite, Teucri.
>
> -- Laocoön
>