[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Solutions for DoS & DDoS
- Subject: Solutions for DoS & DDoS
- From: morrowc.lists at gmail.com (Christopher Morrow)
- Date: Mon, 10 Dec 2012 09:47:58 -0500
- In-reply-to: <[email protected]>
- References: <[email protected]> <CAA9YX5cW+abbmMKUrFj=wHhOeXHr-MXdF3YY+v2vHkWcF=zDtw@mail.gmail.com> <[email protected]>
On Mon, Dec 10, 2012 at 9:33 AM, Ameen Pishdadi <apishdadi at gmail.com> wrote:
> Sounds like an advertisement to me
In the end there are few actual options (in general):
1) do it yourself
2) have your carrier do it for you
3) have a third party do it for you
There are cost and capability considerations with all of these, basically:
1:
- you'll need more pipe - absorb all that can arrive, can you
handle an extra 100gbps of traffic? (or less, you could reasonably
build out for X gbps and just die under Y if the cost is unacceptably
large to absorb Y)
- more people-smarts - understand what is/isn't an attack,
understand peering, transit, costs, complexities, mitigation
techniques and costs involved.
- more equipment - mitigation gear (cisco guard, arbor tms, radware...etc)
2:
- monthly (most times) cost for 'insurance', imagine paying an
uplift on your current bandwidth costs, for mitigation services,
pre-prepared, so all you need to is 'initiate mitigation' inside the
carrier's network.
- people-cost in training to 'make the mitigation happen' (done
right at the carrier this is nothing more than a bgp update from
you...)
3:
- monthly (or one-time) cost, you may be able to initiate it
one-time and walk away, with the attendant costs in management of
adhoc contracts/etc.
- routing changes (do you control at least the /24 around the
resource you need to mitigate?)
- tunneling complexity to return to you the 'clean' traffic
- dns shennigans for those ddos-mitigation folks who don't do
routing change, or prefer DNS ones.
pick what works for you... or your charity org.
-chris