Large DDoS, small extortion

Barry Shein bzs at world.std.com
Fri May 23 17:13:39 UTC 2014


Sure, of course, many of us have. But how is $VICTIM supposed to
distinguish the wheat from the chaff without reference to specific
cases and results?

Some reasonable-sounding suggestions could be counter-productive or
even downright dangerous (depending on the nature of the attacker.) Or
a waste of time.

On May 22, 2014 at 23:22 ikiris at gmail.com (Blake Dunlap) wrote:
 > Most of us wish we didn't. There are so much more productive ways to
 > spend the day than fighting a determined and adaptive attacker.
 > 
 > -Blake
 > 
 > On Thu, May 22, 2014 at 10:20 PM, Roland Dobbins <rdobbins at arbor.net> wrote:
 > >
 > > On May 23, 2014, at 3:38 AM, Barry Shein <bzs at world.std.com> wrote:
 > >
 > >> Some real life experience and results, case studies.
 > >
 > > Some of us have quite a bit of real-life experience and results in these situations.
 > >
 > > ----------------------------------------------------------------------
 > > Roland Dobbins <rdobbins at arbor.net> // <http://www.arbornetworks.com>
 > >
 > >                    Equo ne credite, Teucri.
 > >
 > >                           -- Laocoön
 > >

-- 
        -Barry Shein

The World              | bzs at TheWorld.com           | http://www.TheWorld.com
Purveyors to the Trade | Voice: 800-THE-WRLD        | Dial-Up: US, PR, Canada
Software Tool & Die    | Public Access Internet     | SINCE 1989     *oo*


More information about the NANOG mailing list