[47818] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Arbor Networks DoS defense product

daemon@ATHENA.MIT.EDU (Rob Thomas)
Wed May 15 18:50:32 2002

Date: Wed, 15 May 2002 17:49:59 -0500 (CDT)
From: Rob Thomas <robt@cymru.com>
To: NANOG <nanog@merit.edu>
In-Reply-To: <Pine.LNX.4.44.0205151528200.32573-100000@sasami.anime.net>
Message-ID: <ROTMAILER.0205151748190.17216-100000@dragon.sauron.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


Hi, Dan.

] I don't think spoofing will be a problem for the landmines. Most attacks
] (99%?) are tcp.

Hmm...  Not based on my research.  The most common attack capabilities in
the bots are ICMP and UDP flooders.  After that, IGMP.  Last, TCP.  Most
of the DoS tools contain the same attack types as the bots.

On the receiving end, upwards of 80% of all the woe I track is not TCP.

Thanks,
Rob.
--
Rob Thomas
http://www.cymru.com/~robt
ASSERT(coffee != empty);



home help back first fref pref prev next nref lref last post