DDOS, IDS, RTBH, and Rate limiting
mfidelman at meetinghouse.net
Sun Nov 9 14:32:18 UTC 2014
Roland Dobbins wrote:
> On 9 Nov 2014, at 10:37, Jon Lewis wrote:
>> I'm sure it's not always the case, but in my experience as a SP, the
>> victim virtually always did something to instigate the attack, and is
>> usually someone you don't want as a customer.
> This may be a reflection of your experience and customer base, but it
> isn't a valid generalization. Legitimate customers are attacked all
> the time, for various reasons - including unknowingly having their
> servers compromised and used as C&Cs by miscreants, who're then
> attacked by other miscreants.
> But to say that attacks are 'virtually always' provoked by customers
> themselves simply isn't true. DDoS extortion, ideologically-motivated
> DDoS attacks, maskirovkas intended as a distraction away from other
> activities, simple nihilism, et. al. are, unfortunately, quite common.
>> When I worked for a cloud hosting provider, the DDoS "victims" tended
>> to be fraudulent signups who were doing malicious or anti-social
>> things on the net and were not paying customers anyway.
> Many DDoS attacks are miscreant-vs.-miscreant, that's certainly true.
> Compromised machines are 'attractive nuisances', which is yet another
> reason it's important to have visibility into your network traffic
> (it's easy to get started with NetFlow and open-source tools).
Granted, a sample size of 1 - but the most recent event where we were
the vector for a reflection attack, the target was a game hosting
system. Based on some interaction with their sysadmin, it became pretty
clear that this is fairly common for them, and the motivations had more
to do with hacking gameplay than anything else.
In theory, there is no difference between theory and practice.
In practice, there is. .... Yogi Berra
More information about the NANOG