North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: DOS attack tracing

  • From: Suresh Ramasubramanian
  • Date: Tue May 10 08:07:45 2005
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=uX5sgHAHZAvjV2qhewBJiXBFU0TJOMyuWKVnUNIuGrqxmJG0+BlCIiZHbO3G8vlf3ay7pKvUMcwsZG84jE+yjnz0ZRKeyJt0NbLBX20wuQzeVV8chvfxLIgCFcuGpQGIxRk2iouZLNcWhXpD+p/7S6VsTj1acpA4rViC49B2kLc=

On 5/10/05, Hannigan, Martin <[email protected]> wrote:
> DDOS' is rather infrequent to zero for most enterprises. That DDOS
> golden banana is rather yummy with sprinkles on top. Don't get me wrong,
> the DDOS problem is real, but not for everyone, and not as frequently as
> it's being hyped up to be. A managed service is a better way
> to go if they're worried, IMO.

There's also the "minimze risk" thing .. take a conscious business
decision not to host one of the typical DDoS magnets (dont allow
people to run IRC bots on your colo farm, for example)

-- 
Suresh Ramasubramanian ([email protected])