[AusNOG] DDoS attack sizes
Paul Baker
paul.baker at vocus.com.au
Tue Feb 9 12:24:32 EST 2016
Hi Nick,
Just wanted to throw in my observations as well. We see a huge range of
attack sizes come through our network, typical SYN flood attacks are
just a few hundred Mbps, but as other have suggested, far to often,
attacks (other than SYN) are multiple Gbps - too big for the typical SP
to absorb by throwing extra bandwidth at the problem. We see attacks
>10-20Gbps every day, largest we've seen in recent times is 80Gbps.
If you're lucky enough to not suffer DDoS attacks too regularly, and you
are able to accept cutting off one IP address while it's under attack,
then RTBH is the easiest, cheapest solution to ensure that a Volumetric
DDoS attack isn't able to take down your network. Even if you deploy on
site DDoS mitigation equipment you won't be protected from volumetric
attacks. You will only be able to handle attacks up to the size of your
Internet links. Most ISP's should support RTBH. Hopefully we'll start to
see them support BGP FlowSpec eventually.
If null routing/RTBH is not an option (as you have implied), the best
solution would be a combination of cloud based DDoS mitigation to
eliminate volumetric attacks, with hardening the network edge using
ACLs (you'd be surprised the number of attacks that target UDP port 80
that can easily be eliminated using an ACL) and selectively policing
traffic towards network infrastructure, optional dedicated on-site DDoS
appliances, and protection for server infrastructure by traditional
firewalls or WAF.
Full disclosure: These are just my general observations/recommendations,
but I do work for Vocus Communications who do have DDoS products.
Regards
Paul Baker | Network Architect
Vocus Communications
On 8/02/2016 4:42 PM, Nick Evendor wrote:
> Yesterday we experienced an 850 megabit DDoS attack towards a hosting
> customer which almost filled our gigabit uplink and made our upstream
> provider call me on a Sunday due to abnormal traffic on our port.
>
> Thank god it was Sunday so our network was underutilized with no
> collateral damage and everything remained working, but I asked the
> upstream provider what we can do about it other than null routing the
> destination and they said purchase more capacity.
>
> In the past we have seen a few attacks but they have only been a few
> hundred megabits and never come close to saturating our gigabit uplink.
>
> What size attacks are people seeing and is it time to over purchase
> bandwidth and move to a ten gigabit service.
>
> Nick
>
>
>
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20160209/15cac37d/attachment.html>
More information about the AusNOG
mailing list