UDP Amplification DDoS - Help!
karsten.elfenbein at gmail.com
Tue Feb 9 10:29:07 UTC 2016
You could use multiple PAT addresses to find the source of information
for the attacker and to reduce the impact by filtering/QOS.
TCP connections PAT IP1 (block UDP before going to the 1G line)
UDP connections PAT IP2
webservers connecting to api hosts - PAT IP3
webservers remaining connections - PAT IP4
2016-02-09 0:14 GMT+01:00 Mitch Dyer <mdyer at development-group.net>:
> Hoping someone can point me in the right direction here, even just confirming my suspicions would be incredibly helpful.
> A little bit of background: I have a customer I'm working with that is downstream of a 1Gb link that is experiencing multiple DDoS attacks on a daily basis. Through several captures I've seen what appear to be a mixture of SSDP and DNS amplification attacks (though not at the same time). The attack itself seems to target the PAT address associated with a specific site, if we change the PAT address for the site, the attack targets the new address at the next occurance. We've tried setting up captures and logging inside the network to determine if the SSDP/DNS request originate within the network but that does not appear to be the case.
> We've reached out for some assistance from the upstream carrier but they've only been able to enforce a 24-hour block.
> I'm hoping someone with some experience on this topic would be able to shed some light on a better way to attack this or would be willing to confirm that we are simply SOL without prolonged assistance from the upstream carrier.
> Thanks in advance for any insight.
More information about the NANOG