[47266] in North American Network Operators' Group
Re: Effective ways to deal with DDoS attacks?
daemon@ATHENA.MIT.EDU (Richard A Steenbergen)
Wed May 1 20:59:38 2002
Date: Wed, 1 May 2002 20:59:05 -0400
From: Richard A Steenbergen <ras@e-gerbil.net>
To: Pete Kruckenberg <pete@kruckenberg.com>
Cc: nanog@merit.edu
Message-ID: <20020502005905.GA523@overlord.e-gerbil.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Pine.LNX.4.33.0205011711080.5350-100000@minot.kruckenberg.com>
Errors-To: owner-nanog-outgoing@merit.edu
On Wed, May 01, 2002 at 05:18:24PM -0600, Pete Kruckenberg wrote:
>
> A rather extensive survey of DDoS papers has not resulted in
> much on this topic.
>
> What processes and/or tools are large networks using to
> identify and limit the impact of DDoS attacks?
"DDoS attacks" is such a generic term. There are a wide variety of attacks
which each need to be handled in their own way, the extra "D" is just one
possible twist. Can you explain what kind of attack you're interested in?
I've tried to compile a list of the *practical* things everyone needs to
know (but usually doesn't) to handle DoS effectively, try reading:
http://www.e-gerbil.net/ras/projects/dos/dos.txt
--
Richard A Steenbergen <ras@e-gerbil.net> http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177 (67 29 D7 BC E8 18 3E DA B2 46 B3 D8 14 36 FE B6)