Première page Précédent Suivant Dernière page Résumé Image
Prevention Techniques
How to suppress an attack if you’re the victim:
- Implement ACL’s at network edges to block ICMP echo responses to your high-visibility hosts, such as IRC servers
- Again, will impair troubleshooting -- “ping” breaks
- Will still allow your access pipes to fill
- Work with upstream providers to determine the help they can provide to you
- Blocking ICMP echoes for high-visibility hosts from coming through your access pipes
- Tracing attacks
-
Notes: