North American Network Operators Group|
Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical
Re: On the back of other 'security' posts....
Jack Bates wrote:
From the traffic I've seen there are alot of bots - possibly a couple of 1000, however there are 2 distinct traffic types - spoofed and non spoofed.Owen DeLong wrote: Again, I just don't see where an ISP can or should be held liable forforwarding what appears to be a correctly formatted datagram with a valid
The non spoofed is a pain, but easy to stop. I have been phoning ISPs NOCs getting them shutdown one by one.
The spoofed is the problem and when we are seeing 300k SYN pps coming from addresses 0.0.0.4 through 188.8.131.52 in .4 increments I think the traffic is spoofed rather than there being 10's of thousands of machines (especially from hosts like 0.0.0.4!)
The person responsible is the bot maintainer. Finding the controller medium (probably irc) is the hard part, but once done, monitoring who controls the bots isn't near as hard. Tracking them down can be abit of fun, but usually they get lazy about covering tracks at that point. A few media enriched prison sentences would be good.Granted, however if we could get rid of most of the spoof attacks it would be a damn site easier to track them - I can tell you that the source is coming vi the SprintLink -
Telecom NZ international link - however I cannot find out more on the other side of the pond without speaking to Sprint and I know noone there.