2 May
2002
2 May
'02
9:45 a.m.
On Thu, 2 May 2002, Iljitsch van Beijnum wrote:
Basically, it works like this: when you identify the target of the attack, you have traffic for those target addresses rerouted to a "filter box". This filter box then contains source address based filters to get rid of the attacking traffic.
Two questions: 1) How do you plan on determining what an allowed src address and what isn't? 2) Secondly, how would you deal with spoofed src addresses where the src address is rarely repeated in the attack?