Effective ways to deal with DDoS attacks?

Avleen Vig lists-nanog at silverwraith.com
Thu May 2 13:45:06 UTC 2002


On Thu, 2 May 2002, Iljitsch van Beijnum wrote:

> Basically, it works like this: when you identify the target of the attack,
> you have traffic for those target addresses rerouted to a "filter box".
> This filter box then contains source address based filters to get rid of
> the attacking traffic.

Two questions:
  1) How do you plan on determining what an allowed src address and what
     isn't?
  2) Secondly, how would you deal with spoofed src addresses where the src
     address is rarely repeated in the attack?




More information about the NANOG mailing list