Death of the Internet, Film at 11
drc at virtualized.org
Sat Oct 22 18:21:49 UTC 2016
On October 22, 2016 at 8:09:34 AM, Mike Hammett (nanog at ics-il.net) wrote:
How can I as a network operator seek out and eliminate the sources of these attacks?
Maybe (not sure) one way would be to examine your resolver query logs to look for queries for names that fit domain generation algorithm patterns, then tracking down the customers/devices that are issuing those queries and politely suggest they remove the malware on their systems?
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 490 bytes
Desc: Message signed with OpenPGP using AMPGpg
More information about the NANOG