[51885] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Network Attacks

daemon@ATHENA.MIT.EDU (Barry Raveendran Greene)
Mon Sep 9 17:10:35 2002

From: "Barry Raveendran Greene" <bgreene@cisco.com>
To: <alex@yuriev.com>, "Manolo Hernandez" <manolo@dialtone.com>
Cc: "Nanog" <nanog@merit.edu>
Date: Mon, 9 Sep 2002 14:09:29 -0700
In-Reply-To: <Pine.LNX.4.10.10209091002230.26725-100000@s1.yuriev.com>
Errors-To: owner-nanog-outgoing@merit.edu



I've got a new version of the remote-triggered black hole filtering paper.
That is one way of handling the incident.

http://www.ispbook.com/supplements/Remote_Triggered_Black_Hole_Filtering-02.
pdf



> -----Original Message-----
> From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu]On Behalf Of
> alex@yuriev.com
> Sent: Monday, September 09, 2002 7:04 AM
> To: Manolo Hernandez
> Cc: Nanog
> Subject: Re: Network Attacks
>
>
>
> > How are you all handling network attacks from say China? We had attack
> > today from China Aerospace. RIPE said it was unallocated, ARIN said it
> > was APNIC, APNIC has no valid info on them. What can one do?
>
> Filter the netblocks out of the borders (in)
> Null-route their address space (out)
>
>
> Alex
>
>
>


home help back first fref pref prev next nref lref last post