[34135] in North American Network Operators' Group
Re: Proactive steps to prevent DDOS?
daemon@ATHENA.MIT.EDU (Adam Rothschild)
Mon Jan 29 11:45:43 2001
Date: Mon, 29 Jan 2001 11:44:17 -0500
From: Adam Rothschild <asr@latency.net>
To: David Harmelin <david.harmelin@dante.org.uk>
Cc: nanog@merit.edu
Message-ID: <20010129114417.A84651@og.latency.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <4.2.2.20010129143303.00e12190@alpha.dante.org.uk>; from david.harmelin@dante.org.uk on Mon, Jan 29, 2001 at 03:00:36PM +0000
Errors-To: owner-nanog-outgoing@merit.edu
On Mon, Jan 29, 2001 at 03:00:36PM +0000, David Harmelin wrote:
> DANTE has also developped a tool made of in-house scripts, a
> database and based on netflow exports, that detects more DoS attacks
> than manpower is available to treat [...]
Any chance folks on this list would be willing to share the source (or
failing that, _detailed_ tech specs) to their DoS detection tools? Or
is the general consensus still that this is a big no-no, not even up
for discussion, as such tools are highly proprietary, and the public
scrutiny resulting from such a release would be a Bad Thing(TM)?
I'm sure I'm not alone in saying that lots of smaller folks wouldn't
mind deploying these, but lack the in-house resources needed to
develop them from the ground up.
-adam