[27374] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

!white.house, !panacea, new traceback paper from stefan savage

daemon@ATHENA.MIT.EDU (k claffy)
Mon Feb 14 15:56:50 2000

Date: Mon, 14 Feb 2000 12:54:50 -0800
From: k claffy <kc@caida.org>
To: nanog@merit.edu
Cc: Stefan Savage <savage@cs.washington.edu>,
	david wetherall <djw@cs.washington.edu>, coral-dev@caida.org
Message-ID: <20000214125449.A18216@caida.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Errors-To: owner-nanog-outgoing@merit.edu





(not sure if this has been posted yet, sorry if so)
new relevant paper worth checking out by stefan savage et al 
(david, ann, tom, all UW)
disclaimer, these folks just at the "explore the problem" stage 
and not the "propose a complete implementation now" stage. 


but exploring the problem
is good


  From Stefan:
  On Thu, Feb 10, 2000 at 05:14:56PM -0800, Stefan Savage wrote:
  Hi KC,

  	We've been doing some work on efficient network support 
	for tracing denial-of-service attacks and all of a sudden 
	the topic has some relevance (a strange experience as
	a researcher ;-).  Anyway, this seemed like a good time 
	to introduce our work and try to get some feedback on it.  
	We've put a copy of our paper at:
  
  	http://www.cs.washington.edu/homes/savage/traceback.html
  
	If you have a moment, we'd definitely appreciate any comments
	you might have.  We're also especially interested in getting
	feedback from the ISP operations community and from equipment
	vendors, so please feel free to forward this to anyone you
	think might be interested.  Thanks!

  - Stefan
    <savage@cs.washington.edu>, 
    coauthor david wetherall <djw@cs.washington.edu>
	(and anna and tom)




speaking of non-panaceas,
brett mentioned caida passive monitoring for security.
lemme clarify, 
coralreef has some bits that can detect port-scanning and
then auto-trigger full framed collection on specific filter
	http://www.caida.org/Tools/CoralReef/

but it's quite different animal from traceback 
eg., what rstone's centertrack trying to do
	http://www.nanog.org/mtg-9910/robert.html
	(not sure where that stands wrt deployment)

or what ddrew's cisco-based DOStracker did for what's.now.cw.net

  brettw also said

  if we installed passive monitors on IX links between providers, we
  might be able to do some interesting security traces.

reckon you[pl.]'d have to install a lot of them
and some facility for correlating among them
(and at least coral doesn't have any of that yet,
nor any kind of auto-paging when something looks suspicious)

again, nothing money & hardware & code & a NOC contact list 
can't heavily dent in a year or 2 if folks wanted it badly enough.  
and with other positive benefits to boot.
(in case folks think the malice of undersocial teenagers 
is the biggest threat we face...)
  



home help back first fref pref prev next nref lref last post