[e2e] fault apportionmant and mitigation
John Kristoff
jtk at northwestern.edu
Fri May 18 14:25:03 PDT 2007
On Fri, 18 May 2007 07:40:42 +0100
Jon Crowcroft <Jon.Crowcroft at cl.cam.ac.uk> wrote:
I have some practical experience mitigating DDoS attacks, but from the
perspective of a DNS service provider. So my views may not be a good
representation of all DDoS attacks, but I have seen the same botnets
attack other systems and networks than the type specific to what I have
direct operational responsibilities for.
> some questiosn though:
> botnets -
> i) are they clusteed on certain ISPs/ ASs and
Very often so. Very large national home Internet service providers
are common sources and sometimes a particular botnet is often made up
of many sources from a handful of them. However, in my judgment these
large providers are not necessarily seeing disproportionate numbers
of bots to any other sector. Same goes for every other sector/AS,
they seem to be generally representative of their size. Response,
the ability, willingness and capability to mitigate can differ widely
however.
> iv) dos target : is it mainly server or is it as often topological attacks?
Almost always I see that packet floods are destined to a specific end
system that represents some user/customer server (usually http) or their
DNS service. The target being directly related to the victim that the
attacker is (almost surely) being paid to attack.
> v) ditto scanning
>
> vi) when ISPs shut things down near a source, what is th sequence of take down
> actions (detect/inform/warn/blackhole etc etc) and what are the costs of false
> positive
Often it is either:
detect/verify report-> filter/blackhole -> wait for complaint
or
detect/verify report -> filter/blackhole -> notify
> vii) how often is source spoofing an issue (e.g. would loose source routing make
> it worse much really?:-)
It happens, but not that common in the attacks I've seen (out of the
last dozen I can recall mitigating, maybe twice it happened and in those
particular cases I'm thinking of, they were coupled with a non-spoofed
packet flood attack and the spoofing was easy to detect and filter).
John
More information about the end2end-interest
mailing list