Krebs on Security booted off Akamai network after DDoS attack proves pricey

John Levine johnl at iecc.com
Sat Sep 24 14:47:57 UTC 2016


>> Well...by anycast, I meant BGP anycast, spreading the "target"
>> geographically to a dozen or more well connected/peered origins.  At that
>> point, your ~600G DDoS might only be around
>
>anycast and tcp? the heck you say! :)

People who've tried it say it works fine.  Routes don't flap that often.




More information about the NANOG mailing list