[98738] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: ONS - The few the proud ... the sleeping

daemon@ATHENA.MIT.EDU (michael.dillon@bt.com)
Thu Aug 16 14:01:10 2007

Date: Thu, 16 Aug 2007 16:00:36 +0100
In-Reply-To: <46C457F3.9020506@packetpimp.org>
From: <michael.dillon@bt.com>
To: <nanog@nanog.org>
Errors-To: owner-nanog@merit.edu


> Unless all these bots are directly connected (direct=20
> customer) and concentrated on one portion of the network (not=20
> spread across the entire access layer) I can't imagine with=20
> the tools, features, products, etc that are available today=20
> (that can almost manage dDoS attacks for you) that it=20
> couldn't be mitigated.  5-6 years ago this would have been a=20
> lot tougher, but it was still doable.

Remote triggered BGP blackhole filtering comes to mind
ftp://ftp-eng.cisco.com/cons/isp/security/Remote-Triggered-Black-Hole-Fi
ltering-02.pdf

And if the bots are directly connected or concentrated in one point of
the network, it seems to me that simple ACLs can mitigate the attack.

I agree that DDoS is not likely to take down a network big enough to be
called a backbone unless there is some kind of unforeseen side effects
to the DDoS.

--Michael Dillon

home help back first fref pref prev next nref lref last post