[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[SECURITY] Application layer attacks/DDoS attacks
- Subject: [SECURITY] Application layer attacks/DDoS attacks
- From: ramy.ihashish at gmail.com (Ramy Hashish)
- Date: Sat, 23 May 2015 23:33:42 +0200
- In-reply-to: <CAOLsBOvyYZ8XQL7w9CFt=tBgKAPjegnFes6snETAa=NJipWTtA@mail.gmail.com>
- References: <CAOLsBOu_xVCOUYRPNwxZGCm0RMU93QetegDsp90jX67bsZMFyw@mail.gmail.com> <CAJL_ZMOSkmhX-a=EDtiCj24u_ZBoD_yH5TrWH0xs-umpkpE=UA@mail.gmail.com> <[email protected]> <CAOLsBOvyYZ8XQL7w9CFt=tBgKAPjegnFes6snETAa=NJipWTtA@mail.gmail.com>
Yes Harlan, you are absolutely right, even if this won't stop the
botnet-based DDoS attacks, but at least will significantly decrease the
volume/frequency of the volume based attacks.
On the other side, the DDoS protection now become a business where
all-tiers ISPs make money of, and those ISPs is the exact place where the
implementation of anti-spoofing make the best sense, conflict of interests
now...
However, the trusted network initiative might be a good approach to start
influencing operators to apply anti-spoofing mechanisms.
Salam,
Ramy
On 23 May 2015 10:48 pm, "Harlan Stenn" <stenn at ntp.org> wrote:
Just to ask, what is the expected effect on DDoS attacks if folks
implemented BCP38?
How does the cost of implementing BCP38 compare to the cost of other
solution attempts?
H