[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
large BCP38 compliance testing
On Oct 2, 2014, at 7:54 PM, Alain Hebert <ahebert at pubnix.net> wrote:
> My mindset was set on DDoS and not C&C/SPAM/etc.
My point is that the ability to launch reflection/amplification DDoS attacks (as well as spoofed SYN-floods, and so forth) is dependent upon the ability to spoof packets, and that my hunch is that there're a relatively small number of networks from which the spoofed attack traffic is emitted.
----------------------------------------------------------------------
Roland Dobbins <rdobbins at arbor.net> // <http://www.arbornetworks.com>
Equo ne credite, Teucri.
-- Laocoön