Session 3 Response Measure Traceback React 应对各种威胁的具体措施
Traceback Attacks to the Source
Traceback Essentials
Traceback Valid IPv4 Source Addresses
Traceback Valid IPv4 Source Addresses
Traceback Spoofed IPv4 Addresses
Traceback via Hop by Hop Technique
Traceback via Hop by Hop Technique
Traceback via the Jump to Ingress Technique
Traceback via the Jump to Ingress Technique
Traceback Spoofed IPv4 Addresses
Traceback with ACLs
Traceback with ACLs
Traceback with Netflow
Traceback with Netflow
show ip cache flow
Traceback with Netflow
Traceback with Netflow
Traceback with Netflow
Backscatter Traceback Technique
Backscatter Traceback Technique
Backscatter Traceback Technique
Backscatter Traceback Preparation
Backscatter Traceback Preparation
Backscatter Traceback Preparation
Backscatter Traceback Preparation
Backscatter Traceback Preparation
Backscatter Traceback Preparation
Backscatter Traceback Preparation
Backscatter Traceback Activation
Backscatter Traceback Activation
Backscatter Traceback Activation
Backscatter Traceback Activation
Backscatter Traceback Activation
Backscatter Traceback Activation
Traceback with Edge Probes
Traceback Summary
React to the Attack
Reaction Tools
Reacting to an Attack with CAR
Reacting to an Attack with CAR
Reacting to an Attack with CAR
Reacting to an Attack with CAR
Reacting to an Attack with CAR with Remote Trigger
Reacting to an Attack with CAR with Remote Trigger
Reacting to an Attack with CAR with Remote Trigger
Reacting to an Attack with CAR with Remote Trigger
Detect & Affirm
Sink Hole Router
Sink Hole Architecture
Example: slapper worm 2002.9
Sink Hole: Detect worm
Track DoS Attack
IRR: Network Information
IRR : AS
IP Source Tracker
IP Source Tracker
IP Source Tracker: configure
Use Netflow
Show Ip Cache Flow
Show IP cache verbose flow
Use ACL to Track
Use IXP to track
ICMP Unreachable
How to find router drop packet
ICMP back scatter
ICMP back scatter
ICMP back scatter
Track DoS summary
Anti Dos & DDos measure
Remote Triggered Black Hole
Remote Triggered Black Hole
Remote Triggered Black Hole
Remote Triggered Black Hole
Remote Triggered Black Hole
Triggered source address drop packet
Loose uRPF
Source based remote triggered black hole
Source based remote triggered black hole
Date Cleanout
Departure from the victim
Remote triggered rate limit
Summary
What can we do?
Suggestion
Other notion