North American Network Operators Group Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical Re: Bogon list or Dshield.org type list
[email protected] wrote: [...] > other people could look in their netflow data > for traffic from bogon addresses to your destination. Do other people need such a list to discover invalid source addresses emerging from their networks? > [...] the owners of compromised > machines used to initiate DDOS attacks will begin to secure their machines > the way they should have in the first place. Given. The issue of securing networks has been covered here -- I'd've figured it would have been worked into this issue as a given, for all that it makes tracking attacks in the above scenario a tad more challenging. Peter E. Fry
|