Effective ways to deal with DDoS attacks?

Richard A Steenbergen ras at e-gerbil.net
Thu May 2 00:59:05 UTC 2002


On Wed, May 01, 2002 at 05:18:24PM -0600, Pete Kruckenberg wrote:
> 
> A rather extensive survey of DDoS papers has not resulted in
> much on this topic.
> 
> What processes and/or tools are large networks using to
> identify and limit the impact of DDoS attacks?

"DDoS attacks" is such a generic term. There are a wide variety of attacks 
which each need to be handled in their own way, the extra "D" is just one 
possible twist. Can you explain what kind of attack you're interested in?

I've tried to compile a list of the *practical* things everyone needs to 
know (but usually doesn't) to handle DoS effectively, try reading:

http://www.e-gerbil.net/ras/projects/dos/dos.txt

-- 
Richard A Steenbergen <ras at e-gerbil.net>       http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



More information about the NANOG mailing list