UDP port 80 DDoS attack

Jeff Wheeler jsw at inconcepts.biz
Mon Feb 6 01:33:29 CST 2012


On Sun, Feb 5, 2012 at 10:08 PM, Steve Bertrand
<steve.bertrand at gmail.com> wrote:
> This is so very easily automated. Even if you don't actually want to trigger
> the routes automatically, finding the sources you want to blackhole is as

What transit providers are doing flow-spec, or otherwise, to allow
their downstreams to block malicious traffic by SOURCE address?

-- 
Jeff S Wheeler <jsw at inconcepts.biz>
Sr Network Operator  /  Innovative Network Concepts



More information about the NANOG mailing list