Over a decade of DDOS--any progress yet?

Patrick W. Gilmore patrick at ianai.net
Mon Dec 6 15:40:20 UTC 2010


On Dec 6, 2010, at 10:34 AM, David Ulevitch <david at ulevitch.com> wrote:
> On Mon, Dec 6, 2010 at 6:10 AM, Patrick W. Gilmore <patrick at ianai.net> wrote:
>> On Dec 6, 2010, at 4:07 AM, Jonas Frey (Probe Networks) wrote:
>> 
>>> Besides having *alot* of bandwidth theres not really much you can do to
>>> mitigate. Once you have the bandwidth you can filter (w/good hardware).
>>> Even if you go for 802.3ba with 40/100 Gbps...you'll need alot of pipes.
>> 
>> There is a variation on that theme.  Using a distributed architecture (anycast, CDN, whatever), you can limit the attack to certain nodes.  If you have 20 nodes and get attacked from a botnet China, only the users on the same node as the Chinese use will be down.  The other 95% of your users will be fine.  This is true even if you have 1 Gbps per node, and the attack is 100 Gbps strong.
> 
> I think this is only true if you run your BGP session on a different
> path (or have your provider pin down a static route).

You are assuming many things - such as the fact bgp is used at all.

But yes, of course you have to ensure the attack traffic does not move when you get attacked or you end up with a domino effect that takes out your entire infrastructure.


> But as you and others have pointed out, not a lot of defense against
> DDoS these days besides horsepower and anycast. :-)

Not just anycast.  I said distributed architecture.  There are more ways to distribute than anycast.

Not everything is limited to 13 IP addresses at the GTLDs, David. :-)

-- 
TTFN,
patrick





More information about the NANOG mailing list