[47811] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Arbor Networks DoS defense product

daemon@ATHENA.MIT.EDU (Dan Hollis)
Wed May 15 16:55:15 2002

Date: Wed, 15 May 2002 13:54:40 -0700 (PDT)
From: Dan Hollis <goemon@anime.net>
To: Rob Thomas <robt@cymru.com>
Cc: NANOG <nanog@merit.edu>
In-Reply-To: <ROTMAILER.0205151538090.17216-100000@dragon.sauron.net>
Message-ID: <Pine.LNX.4.44.0205151347020.31318-100000@sasami.anime.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


On Wed, 15 May 2002, Rob Thomas wrote:
> ] It could be very useful as deterrence to know their criteria.
> For the low fee of a cool t-shirt or a bit of gear for my lab I'd be
> happy to spread rumours about the mad fast honeypot residing within
> your prefixes.  :)

disinformation as a means to raise the level of uncertainty for the 
attacker, it's classic military tactic. what other military tactics can 
be used to make life more dangerous for attackers?

i've been tossing around an idea for a "land mine network". randomly 
distributed honeypots around the internet. when X landmines are hit from 
the same source, that source gets entered into a BGP blackhole feed which 
anyone can subscribe to. put landmines in popularly targeted networks, 
maybe even make them randomly move about. there are all sorts of wonderful 
tactics that could be put to use.

scanning would quickly become self defeating as attackers would only 
manage to cut themselves off from the net.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]


home help back first fref pref prev next nref lref last post