Security Basics mailing list archives
Re: mitigating ddos attacks
From: Kevin Willock <kevin () cipher1 com>
Date: Fri, 12 Nov 2004 15:17:46 -0700
tito.basa wrote:
when one client or a network link is found to be misbehaving, i'd scan for abnormal traffic, logs in firewalls/routers, or my favorite netflow (from cisco)there i can get the source/destination address of the attack. once determined, i'd either null route filter with ACLS (after tracing back to my network edge) rate-limitin most cases, i'd contact my upstreams to block the source and traceback. Problem is not all my uplinks can respond to my call, so having the ability to re-route traffic to a single link (if availale) through BGP and asking justone uplink to do trace/block it (some problem iis when addresses are spoofed)
The problem with this solution is that with the current model for blocking DDoS attacks, you will often have to block a large block of IP's as, not only do they spoof the IP addresses, but they often are run from thousands+ of machines. This becomes a serious problem if your business model requires users from this block of IP's to access your website in order for you to make profits.
you need close coordination with your uplinks for this since filtering onyour side won't help much as your links are now congested. rate-limiting and logging can gather you evidence and a long list of address to track down later.
Being in good contact with your service providers, and having a game plan in place in case such an attack occurs is a crucial point of business.
the only one i saw was cisco riverhead but is too pricey for us and even useless if our uplinks have no idea what to do. What i did was to over-specs and re-designed my networkThe cisco riverhead unit is an effective solution, and compare the cost of the unit, against the cost of your application being down for x amount of hours. These devices usually pay for themselves in the end. Dan is correct in stating, that if the attack is larger than your pipe, or your providers pipe, you will be unprotected. Too add to this statement, is the new style of DDoS attacks, are very difficult to detect via these machines (I'm sure in new incarnations of them this support will be added). The attacks that we are seeing these days are seemingly legitimate GET requests, but they come in droves, rapidly and from millions of spoofed addresses. I suggest, when looking for a solution, you find one that will be upgradeable, (via firmware on a appliance, or through a managed service).after attacks.
Current thread:
- mitigating ddos attacks Dan Duplito (Nov 05)
- Re: mitigating ddos attacks Kevin Willock (Nov 05)
- Re: mitigating ddos attacks tito.basa (Nov 12)
- Re: mitigating ddos attacks Kevin Willock (Nov 15)
- <Possible follow-ups>
- Re: mitigating ddos attacks Dan Duplito (Nov 08)
