[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
DDoS using port 0 and 53 (DNS)
- Subject: DDoS using port 0 and 53 (DNS)
- From: rdobbins at arbor.net (Dobbins, Roland)
- Date: Wed, 25 Jul 2012 16:39:13 +0000
- In-reply-to: <CADb+6TD6EMN7i9G99hPrhBh2ck-NwRqUuoQ1ubmnsHYN=iXAkg@mail.gmail.com>
- References: <[email protected]> <CAAAwwbW3C6dLC-j+LgpVoOnyJOWPskfMaAJg5RKB22=oqy2pBA@mail.gmail.com> <20120725094343.16f4a397@localhost> <CADb+6TD6EMN7i9G99hPrhBh2ck-NwRqUuoQ1ubmnsHYN=iXAkg@mail.gmail.com>
On Jul 25, 2012, at 9:52 PM, Joel Maslak wrote:
> In addition to the fragments, these packets might also be non-TCP/UDP (ICMP, GRE, 6to4 and other IP-IP, etc).
NetFlow will report the correct protocol number.
-----------------------------------------------------------------------
Roland Dobbins <rdobbins at arbor.net> // <http://www.arbornetworks.com>
Luck is the residue of opportunity and design.
-- John Milton