Is there a line of defense against Distributed Reflective attacks?
Steven M. Bellovin
smb at research.att.com
Sun Jan 19 04:16:59 UTC 2003
In message <Pine.GSO.4.44.0301182004040.16112-100000 at clifden.donelan.com>, Sean
Donelan writes:
>
>On Sat, 18 Jan 2003, Steven M. Bellovin wrote:
>> theory, trace a single packet. But the real problem with either idea
>> is this: suppose that you know, unambiguously and unequivocally, that
>> 750 zombies are attacking you. What do you do with that information?
>
>The reality is its not 750 zombies, its generally one person controlling
>750 zombies attacking you.
Right -- and neither itrace nor hash-based tracing are going to solve
that:
>
> 3) Find and convict the true attacker
Hash-based trace might help on that, *if* there was recording of the
packets to the zombies. But doing that ubiquitously might -- would? --
turn the Internet into a surveillance state.
>
> 2) Track and stop DDOS quickly when it does happen
That's the point of pushback.
>So how do we
> 1) Make end-user systems less vulnerable to being compromised
That's my real goal...
--Steve Bellovin, http://www.research.att.com/~smb (me)
http://www.wilyhacker.com (2nd edition of "Firewalls" book)
More information about the NANOG
mailing list