UDP port 80 DDoS attack

Jeff Wheeler jsw at inconcepts.biz
Mon Feb 6 07:33:29 UTC 2012

On Sun, Feb 5, 2012 at 10:08 PM, Steve Bertrand
<steve.bertrand at gmail.com> wrote:
> This is so very easily automated. Even if you don't actually want to trigger
> the routes automatically, finding the sources you want to blackhole is as

What transit providers are doing flow-spec, or otherwise, to allow
their downstreams to block malicious traffic by SOURCE address?

Jeff S Wheeler <jsw at inconcepts.biz>
Sr Network Operator  /  Innovative Network Concepts

More information about the NANOG mailing list