DDoS auto-mitigation best practices (for eyeball networks)

Randy randy_94108 at yahoo.com
Sun Sep 20 00:44:21 UTC 2015


----- Original Message -----

From: Frank Bulk <frnkblk at iname.com>
To: nanog at nanog.org
Cc: 
Sent: Saturday, September 19, 2015 12:54 PM
Subject: DDoS auto-mitigation best practices (for eyeball networks)

Could the community share some DDoS auto-mitigation best practices for
eyeball networks, where the target is a residential broadband subscriber?
I'm not asking so much about the customer communication as much as
configuration of any thresholds or settings, such as:
- minimum traffic volume before responding (for volumetric attacks)
- minimum time to wait before responding
- filter percentage: 100% of the traffic toward target (or if volumetric,
just a certain percentage)?
- time before mitigation is automatically removed
- and if the attack should recur shortly thereafter, time to respond and
remove again
- use of an upstream provider(s) mitigation services versus one's own
mitigation tools
- network placement of mitigation (presumably upstream as possible)
- and anything else

I ask about best practice for broadband subscribers on eyeball networks
because it's different environment than data center and hosting environments
or when one's network is being used to DDoS a target.

Regards,


Frank

Frank,
If you figure out a way to protect residential-BB-clients, I would love to know!

Regards,
./Randy



More information about the NANOG mailing list