SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
Issue Date:
Revision:
Community tools to fight
against DDoS
Fakrul Alam
Senior Training Officer
SANOG 27 & APNIC Regional Meeting, Kathmandu, Nepal
25 Jan - 01 Feb, 2016
26-12-2015
1.3
DDoS
• Denial of Service (DoS) / Distributed Denial of Service
(DDoS) is the act of
– performing an attack which prevents the system from providing
services to legitimate users
• Denial of Service attacks take many forms, and utilize many
attack vectors
• Used to cover up other attack vectors
Types of Attacks
• Volume Based Attacks
• Application Layer Attacks
3
http://thehackernews.com/2016/01/biggest-ddos-attack.html
Addressing DDoS attacks
• Preparation
– Deploy necessary tools and grab list
• Detection
– Detect incoming fake requests
• Mitigation
– Diversion : Send traffic to a specialized device that removes the fake
packets from the traffic stream while retaining the legitimate packets
– Return : Send back the clean traffic to the server
3 Community tools
• Bogon Filter
– https://www.team-cymru.org/bogon-reference.html
• Flow Sonar
– https://www.team-cymru.org/Flow-Sonar.html
• UTRS (Unwanted Traffic Removal Service)
– https://www.team-cymru.org/UTRS/index.html
1. Bogon Filter
Bogon Filter
• A bogon prefix is a route that should never appear in the
Internet routing table
– Bogons are defined as Martians (private and reserved addresses
defined by RFC 1918, RFC 5735, and RFC 6598) and netblocks that
have not been allocated to a RIR by the IANA
• These are commonly found as the source addresses of
DDoS attacks
• Study shows 60% of the naughty packets were obvious
bogons
• Bogon and fullbogon lists are NOT static lists
Bogon Filter : Configuration IPv4
router bgp 17821
neighbor 38.229.xxx.xxx remote-as 65332
neighbor 38.229.xxx.xxx description CYMRUBOGONS
neighbor 38.229.xxx.xxx ebgp-multihop 255
neighbor 38.229.xxx.xxx password 7 070C134D575F0A5116
neighbor 38.229.xxx.xxx update-source Loopback0
!
address-family ipv4
neighbor 38.229.xxx.xxx activate
neighbor 38.229.xxx.xxx soft-reconfiguration inbound
neighbor 38.229.xxx.xxx prefix-list CYMRU-OUT-V4 out
neighbor 38.229.xxx.xxx route-map CYMRUBOGONS-V4 in
!
!configure community list to accept the bogon prefixes into the route-map
ip community-list 100 permit 65332:17821
!
!configure route-map. Remember to apply it to the proper peering sessions.
route-map CYMRUBOGONS-V4 permit 10
description IPv4 Filter bogons learned from cymru.com bogon route-servers
match community 100
set ip next-hop 192.0.2.1
!
!set a bogon next-hop on all routers that receive the bogons
ip route 192.0.2.1 255.255.255.255 Null0
!
ip prefix-list CYMRU-OUT-V4 seq 5 deny 0.0.0.0/0 le 32
8
Bogon Filter : Configuration IPv6
router bgp 17821
neighbor 2620:0:6B0::xxxx:xxxx remote-as 65332
neighbor 2620:0:6B0::xxxx:xxxx description CYMRUBOGONS
neighbor 2620:0:6B0::xxxx:xxxx ebgp-multihop 255
neighbor 2620:0:6B0::xxxx:xxxx password 7 0458390716775F1A08
neighbor 2620:0:6B0::xxxx:xxxx update-source Loopback0
!
address-family ipv6
neighbor 2620:0:6B0::xxxx:xxxx activate
neighbor 2620:0:6B0::xxxx:xxxx soft-reconfiguration inbound
neighbor 2620:0:6B0::xxxx:xxxx prefix-list CYMRU-OUT-V6 out
neighbor 2620:0:6B0::xxxx:xxxx route-map CYMRUBOGONS-V6 in
!
!configure community list to accept the bogon prefixes into the route-map
ip community-list 100 permit 65332:17821
!
!configure route-map. Remember to apply it to the proper peering sessions.
route-map CYMRUBOGONS-V6 permit 10
description IPv6 Filter bogons learned from cymru.com bogon route-servers
match community 100
set ipv6 next-hop 2001:DB8:0:DEAD:BEEF::1
!
!set a bogon next-hop on all routers that receive the bogons
ipv6 route 2001:DB8:0:DEAD:BEEF::1/128 Null0
!
ipv6 prefix-list CYMRU-OUT-V6 seq 5 deny ::/0 le 128
9
Bogon Filter : Output
APNIC-Training-Lab01#show ip bgp 31.22.8.0/21
BGP routing table entry for 31.22.8.0/21, version 175332535
Paths: (1 available, best #1, table default, not advertised
to EBGP peer)
Advertised to update-groups:
1
Refresh Epoch 1
65332, (received & used)
192.0.2.1 from 38.229.66.20 (38.229.66.20)
Origin IGP, localpref 100, valid, external, best
Community: 65332:17821 no-export
rx pathid: 0, tx pathid: 0x0
10
Bogon Filter : Status
• The IPv4 fullbogons list is approximately 3,714 prefixes.
– [date : 26th January, 2016]
• The IPv6 fullbogons list is approximately 65,788 prefixes.
– [date : 26th January, 2016]
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ
Up/Down State/PfxRcd
38.229.xxx.xxx 4 65332 12017 12017 186072391 0
0 1w0d 3733
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ
Up/Down State/PfxRcd
2404:A800:xxxx:xx::xxxx
4 9498 3239994 72131 40075514 0 0
3w1d 65788
Bogon Filter : Peering
• Contact bogonrs@cymru.com
1. Which bogon types you wish to receive (traditional IPv4 bogons,
IPv4 fullbogons, and/or IPv6 fullbogons)
2. Your AS number
3. The IP address(es) you want us to peer with
4. Does your equipment support MD5 passwords for BGP sessions?
5. Optional: your GPG/PGP public key
• https://www.team-cymru.org/bogon-reference-bgp.html
2. Flow Sonar
Flow Sonar
• The Team Cymru Flow Sonar system is a powerful tool for
network managers to visually identify and understand what
is happening on their network at any given time
• Leveraging the free and open-source framework provided
by Peter Haag of SWITCH
• Special plugins "dosrannu" developed by Team Cymru to
track malicious activity on your network
• Unique dosrannu feeds alerted to DDoS attacks,
compromised machines, and the presence of connections
to C&C hosts
Flow Sonar
It’s
nfsens/nfd
ump!!!
Flow Sonar : Get It
• Contact outreach@cymru.com
1. Team Cymru will send hardware
• 1 Server
• 1 Router
• https://www.team-cymru.org/Flow-Sonar.html
3. UTRS (Unwanted Traffic
Removal Service)
RTBH 101
CE
IP : 1.2.3.4
BGP : 1.2.3.0/24
PE
Transit I
Transit II
Provider InfraCustomer Infra
Website
Internet
IP : 203.0.113.114
BGP : 203.0.113.0/24
RTBH 101
CE
IP : 1.2.3.4
BGP : 1.2.3.0/24
PE
Transit I
Transit II
Provider InfraCustomer Infra
Website
Internet
DDoS Traffic
DDoS Traffic DDoS Traffic
IP : 203.0.113.114
BGP : 203.0.113.0/24
RTBH 101
CE
IP : 1.2.3.4
BGP : 1.2.3.0/24
PE
Transit I
Transit II
Provider InfraCustomer Infra
Website
Internet
DDoS Traffic
DDoS Traffic DDoS Traffic
BGP : 1.2.3.4/32
COM : 65420:666
IP : 203.0.113.114
BGP : 203.0.113.0/24
BGP : 203.0.113.0/32
COM : 65420:420
RTBH 101
CE
IP : 1.2.3.4
BGP : 1.2.3.0/24
PE
Transit I
Transit II
Provider InfraCustomer Infra
Website
Internet
DDoS Traffic
BGP : 1.2.3.4/32
COM : 65420:666
IP : 1.2.3.4/32 -> discard
IP : 1.2.3.4/32 -> discard
IP : 203.0.113.114
BGP : 203.0.113.0/24
BGP : 203.0.113.0/32
COM : 65420:420
IP : 203.0.113.114/32
IP : 203.0.113.114/32
RTBH Upstream
• Check whether your upsteam provider support RTBH
• Configure & Test RTBH before incident
• Only announce IPv4 /32's from address space you originate
or your customer
UTRS
• It’s based on the basic principle of DDoS filtering; Remotely
Triggered Black Hole Filtering
• UTRS is a system that helps mitigate large infrastructure
attacks by leveraging:
– an existing network of cooperating BGP speakers such as ISPs,
hosting providers and educational institutions
– that automatically distributes verified BGP-based filter rules from
victim to cooperating networks
UTRS : Configuration
router bgp 17821
neighbor 154.35.xxx.xxx remote-as 64496
neighbor 154.35.xxx.xxx description CYMRUBOGONS-UTRS
neighbor 154.35.xxx.xxx ebgp-multihop 255
neighbor 154.35.xxx.xxx transport connection-mode passive
neighbor 154.35.xxx.xxx password 7 xxxxxxxxxxxxxxxxxxxxxx
neighbor 154.35.xxx.xxx update-source Loopback0
!
address-family ipv4
neighbor 154.35.xxx.xxx activate
neighbor 154.35.xxx.xxx send-community
neighbor 154.35.xxx.xxx soft-reconfiguration inbound
neighbor 154.35.xxx.xxx route-map UTRS-OUT out
neighbor 154.35.xxx.xxx route-map UTRS-IN in
!
access-list 1 remark utility ACL to deny everything
access-list 1 deny any
!
ip prefix-list 32-only permit 0.0.0.0/0 ge 32
ip community-list standard RTBH permit 17821:0
!
route-map UTRS-IN permit 10
match ip address prefix-list 32-only
route-map UTRS-IN deny 100
match ip address 1
!
route-map UTRS-OUT permit 10
match ip address prefix-list 32-only
match community RTBH
route-map UTRS-OUT deny 100
match ip address 1
24
ip route 203.176.189.10 255.255.255.255 null0
UTRS : Apply
• Newly launched service
– Quite picky to choose whom to peer
– Do organization verification
• https://www.team-cymru.org/UTRS/index.html
• FAQ:
– https://www.cymru.com/jtk/misc/utrs.html
How UTRS varies from RTBH
with upstream!
Other Efforts
• NANOG BCOP : DDoS-DoS-attack-BCOP
– http://bcop.nanog.org/index.php/DDoS-DoS-attack-BCOP
• Routing Resilience Manifesto
– Mutually Agreed Norms for Routing Security (MANRS)
– https://www.routingmanifesto.org/manrs/
28
Questions!

Contenu connexe

Tendances

Measuring IPv6 Performance, RIPE73
Measuring IPv6 Performance, RIPE73Measuring IPv6 Performance, RIPE73
Measuring IPv6 Performance, RIPE73APNIC
 
IPv6 and the DNS, RIPE 73
IPv6 and the DNS, RIPE 73IPv6 and the DNS, RIPE 73
IPv6 and the DNS, RIPE 73APNIC
 
More specific announcments in BGP
More specific announcments in BGPMore specific announcments in BGP
More specific announcments in BGPAPNIC
 
npNOG 2: APNIC IPv6 deployment
npNOG 2: APNIC IPv6 deploymentnpNOG 2: APNIC IPv6 deployment
npNOG 2: APNIC IPv6 deploymentAPNIC
 
NZNOG 2020: APNIC update
NZNOG 2020: APNIC updateNZNOG 2020: APNIC update
NZNOG 2020: APNIC updateAPNIC
 
PhNOG 2020: ROA and RPKI in the Philippines
PhNOG 2020: ROA and RPKI in the PhilippinesPhNOG 2020: ROA and RPKI in the Philippines
PhNOG 2020: ROA and RPKI in the PhilippinesAPNIC
 
BGP: Whats so special about the number 512?
BGP: Whats so special about the number 512?BGP: Whats so special about the number 512?
BGP: Whats so special about the number 512?GeoffHuston
 
APNIC Updates
APNIC UpdatesAPNIC Updates
APNIC UpdatesMyNOG
 
IPv6 deployment at APNIC
IPv6 deployment at APNICIPv6 deployment at APNIC
IPv6 deployment at APNICAPNIC
 
Welcome to the APNIC Member Gathering, Mongolia
Welcome to the APNIC Member Gathering, MongoliaWelcome to the APNIC Member Gathering, Mongolia
Welcome to the APNIC Member Gathering, MongoliaAPNIC
 
MyIX Updates
MyIX UpdatesMyIX Updates
MyIX UpdatesMyNOG
 
IPv6 deployment architecture for broadband access networks
IPv6 deployment architecture for broadband access networksIPv6 deployment architecture for broadband access networks
IPv6 deployment architecture for broadband access networksAPNIC
 
Securing global routing system and operators approach
Securing global routing system and operators approachSecuring global routing system and operators approach
Securing global routing system and operators approachAPNIC
 
Scaling BGP
Scaling BGPScaling BGP
Scaling BGPAPNIC
 
IPv6 at FPT Telecom
IPv6 at FPT TelecomIPv6 at FPT Telecom
IPv6 at FPT TelecomAPNIC
 
The case for IPv6
The case for IPv6The case for IPv6
The case for IPv6APNIC
 
Apnic IPv6 Deployment
Apnic IPv6 DeploymentApnic IPv6 Deployment
Apnic IPv6 DeploymentAPNIC
 
Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24APNIC
 

Tendances (20)

Measuring IPv6 Performance, RIPE73
Measuring IPv6 Performance, RIPE73Measuring IPv6 Performance, RIPE73
Measuring IPv6 Performance, RIPE73
 
IPv6 and the DNS, RIPE 73
IPv6 and the DNS, RIPE 73IPv6 and the DNS, RIPE 73
IPv6 and the DNS, RIPE 73
 
More specific announcments in BGP
More specific announcments in BGPMore specific announcments in BGP
More specific announcments in BGP
 
npNOG 2: APNIC IPv6 deployment
npNOG 2: APNIC IPv6 deploymentnpNOG 2: APNIC IPv6 deployment
npNOG 2: APNIC IPv6 deployment
 
NZNOG 2020: APNIC update
NZNOG 2020: APNIC updateNZNOG 2020: APNIC update
NZNOG 2020: APNIC update
 
PhNOG 2020: ROA and RPKI in the Philippines
PhNOG 2020: ROA and RPKI in the PhilippinesPhNOG 2020: ROA and RPKI in the Philippines
PhNOG 2020: ROA and RPKI in the Philippines
 
BGP: Whats so special about the number 512?
BGP: Whats so special about the number 512?BGP: Whats so special about the number 512?
BGP: Whats so special about the number 512?
 
APNIC Updates
APNIC UpdatesAPNIC Updates
APNIC Updates
 
IPv6 deployment at APNIC
IPv6 deployment at APNICIPv6 deployment at APNIC
IPv6 deployment at APNIC
 
Welcome to the APNIC Member Gathering, Mongolia
Welcome to the APNIC Member Gathering, MongoliaWelcome to the APNIC Member Gathering, Mongolia
Welcome to the APNIC Member Gathering, Mongolia
 
MyIX Updates
MyIX UpdatesMyIX Updates
MyIX Updates
 
IPv6 deployment architecture for broadband access networks
IPv6 deployment architecture for broadband access networksIPv6 deployment architecture for broadband access networks
IPv6 deployment architecture for broadband access networks
 
Securing global routing system and operators approach
Securing global routing system and operators approachSecuring global routing system and operators approach
Securing global routing system and operators approach
 
Scaling BGP
Scaling BGPScaling BGP
Scaling BGP
 
IPv6 Deployment Update
IPv6 Deployment UpdateIPv6 Deployment Update
IPv6 Deployment Update
 
IPv6 at FPT Telecom
IPv6 at FPT TelecomIPv6 at FPT Telecom
IPv6 at FPT Telecom
 
The case for IPv6
The case for IPv6The case for IPv6
The case for IPv6
 
Apnic IPv6 Deployment
Apnic IPv6 DeploymentApnic IPv6 Deployment
Apnic IPv6 Deployment
 
Application of local Internet content
Application of local Internet content Application of local Internet content
Application of local Internet content
 
Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24
 

En vedette

Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitMen and Mice
 
Windows 2012 and DNSSEC
Windows 2012 and DNSSECWindows 2012 and DNSSEC
Windows 2012 and DNSSECMen and Mice
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNSMen and Mice
 
Linux15 dynamic dns-2
Linux15 dynamic dns-2Linux15 dynamic dns-2
Linux15 dynamic dns-2Jainul Musani
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsMen and Mice
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?Men and Mice
 
BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practicesMen and Mice
 
DDoS Attacks : Preparation Detection Mitigation
DDoS Attacks : Preparation Detection MitigationDDoS Attacks : Preparation Detection Mitigation
DDoS Attacks : Preparation Detection MitigationFakrul Alam
 
Ripe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigationRipe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigationPavel Odintsov
 

En vedette (12)

DNSSec
DNSSecDNSSec
DNSSec
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runit
 
Windows 2012 and DNSSEC
Windows 2012 and DNSSECWindows 2012 and DNSSEC
Windows 2012 and DNSSEC
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
 
Linux15 dynamic dns-2
Linux15 dynamic dns-2Linux15 dynamic dns-2
Linux15 dynamic dns-2
 
Linux14 Dynamic DNS
Linux14 Dynamic DNSLinux14 Dynamic DNS
Linux14 Dynamic DNS
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing Solutions
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
 
BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practices
 
DDoS Attacks : Preparation Detection Mitigation
DDoS Attacks : Preparation Detection MitigationDDoS Attacks : Preparation Detection Mitigation
DDoS Attacks : Preparation Detection Mitigation
 
Community Tools to Fight Against DDoS
Community Tools to Fight Against DDoS Community Tools to Fight Against DDoS
Community Tools to Fight Against DDoS
 
Ripe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigationRipe71 FastNetMon open source DoS / DDoS mitigation
Ripe71 FastNetMon open source DoS / DDoS mitigation
 

Similaire à Community tools to fight against DDoS, SANOG 27

BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingAPNIC
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKIAPNIC
 
Implementing Internet and MPLS BGP
Implementing Internet and MPLS BGPImplementing Internet and MPLS BGP
Implementing Internet and MPLS BGPPrivate
 
Networking in college
Networking in collegeNetworking in college
Networking in collegeHarpreet Gaba
 
T4 Handout3
T4 Handout3T4 Handout3
T4 Handout3gobed
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214Mac An
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionAPNIC
 
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry developmentAPNIC
 
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen MaMyNOG
 
PhNOG 2019: RPKI Deployment Update
PhNOG 2019: RPKI Deployment UpdatePhNOG 2019: RPKI Deployment Update
PhNOG 2019: RPKI Deployment UpdateAPNIC
 
LKNOG3-Keynote
LKNOG3-KeynoteLKNOG3-Keynote
LKNOG3-KeynoteLKNOG
 
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaLkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaAPNIC
 
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...ThousandEyes
 
Visualizing Network Security Threats
Visualizing Network Security ThreatsVisualizing Network Security Threats
Visualizing Network Security ThreatsThousandEyes
 

Similaire à Community tools to fight against DDoS, SANOG 27 (20)

MANRS for Network Operators
MANRS for Network OperatorsMANRS for Network Operators
MANRS for Network Operators
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet Routing
 
Introduction to RPKI
Introduction to RPKIIntroduction to RPKI
Introduction to RPKI
 
Implementing Internet and MPLS BGP
Implementing Internet and MPLS BGPImplementing Internet and MPLS BGP
Implementing Internet and MPLS BGP
 
CLUE ITC28.pptx
CLUE ITC28.pptxCLUE ITC28.pptx
CLUE ITC28.pptx
 
Secure BGP and Operational Report of Bangladesh
Secure BGP and Operational Report of BangladeshSecure BGP and Operational Report of Bangladesh
Secure BGP and Operational Report of Bangladesh
 
Networking in college
Networking in collegeNetworking in college
Networking in college
 
bgp.ppt
bgp.pptbgp.ppt
bgp.ppt
 
T4 Handout3
T4 Handout3T4 Handout3
T4 Handout3
 
ION Bangladesh - Secure BGP and Operational Report of Bangladesh
ION Bangladesh - Secure BGP and Operational Report of BangladeshION Bangladesh - Secure BGP and Operational Report of Bangladesh
ION Bangladesh - Secure BGP and Operational Report of Bangladesh
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
2017 01-31-cgns
2017 01-31-cgns2017 01-31-cgns
2017 01-31-cgns
 
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development32nd TWNIC IP OPM: ROA+ROV deployment & industry development
32nd TWNIC IP OPM: ROA+ROV deployment & industry development
 
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
 
PhNOG 2019: RPKI Deployment Update
PhNOG 2019: RPKI Deployment UpdatePhNOG 2019: RPKI Deployment Update
PhNOG 2019: RPKI Deployment Update
 
LKNOG3-Keynote
LKNOG3-KeynoteLKNOG3-Keynote
LKNOG3-Keynote
 
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri LankaLkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
LkNOG 3: Strengthening the Internet infrastructure in Sri Lanka
 
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
 
Visualizing Network Security Threats
Visualizing Network Security ThreatsVisualizing Network Security Threats
Visualizing Network Security Threats
 

Plus de APNIC

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 

Plus de APNIC (20)

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 

Dernier

Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 

Dernier (20)

Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 

Community tools to fight against DDoS, SANOG 27

  • 1. Issue Date: Revision: Community tools to fight against DDoS Fakrul Alam Senior Training Officer SANOG 27 & APNIC Regional Meeting, Kathmandu, Nepal 25 Jan - 01 Feb, 2016 26-12-2015 1.3
  • 2. DDoS • Denial of Service (DoS) / Distributed Denial of Service (DDoS) is the act of – performing an attack which prevents the system from providing services to legitimate users • Denial of Service attacks take many forms, and utilize many attack vectors • Used to cover up other attack vectors
  • 3. Types of Attacks • Volume Based Attacks • Application Layer Attacks 3 http://thehackernews.com/2016/01/biggest-ddos-attack.html
  • 4. Addressing DDoS attacks • Preparation – Deploy necessary tools and grab list • Detection – Detect incoming fake requests • Mitigation – Diversion : Send traffic to a specialized device that removes the fake packets from the traffic stream while retaining the legitimate packets – Return : Send back the clean traffic to the server
  • 5. 3 Community tools • Bogon Filter – https://www.team-cymru.org/bogon-reference.html • Flow Sonar – https://www.team-cymru.org/Flow-Sonar.html • UTRS (Unwanted Traffic Removal Service) – https://www.team-cymru.org/UTRS/index.html
  • 7. Bogon Filter • A bogon prefix is a route that should never appear in the Internet routing table – Bogons are defined as Martians (private and reserved addresses defined by RFC 1918, RFC 5735, and RFC 6598) and netblocks that have not been allocated to a RIR by the IANA • These are commonly found as the source addresses of DDoS attacks • Study shows 60% of the naughty packets were obvious bogons • Bogon and fullbogon lists are NOT static lists
  • 8. Bogon Filter : Configuration IPv4 router bgp 17821 neighbor 38.229.xxx.xxx remote-as 65332 neighbor 38.229.xxx.xxx description CYMRUBOGONS neighbor 38.229.xxx.xxx ebgp-multihop 255 neighbor 38.229.xxx.xxx password 7 070C134D575F0A5116 neighbor 38.229.xxx.xxx update-source Loopback0 ! address-family ipv4 neighbor 38.229.xxx.xxx activate neighbor 38.229.xxx.xxx soft-reconfiguration inbound neighbor 38.229.xxx.xxx prefix-list CYMRU-OUT-V4 out neighbor 38.229.xxx.xxx route-map CYMRUBOGONS-V4 in ! !configure community list to accept the bogon prefixes into the route-map ip community-list 100 permit 65332:17821 ! !configure route-map. Remember to apply it to the proper peering sessions. route-map CYMRUBOGONS-V4 permit 10 description IPv4 Filter bogons learned from cymru.com bogon route-servers match community 100 set ip next-hop 192.0.2.1 ! !set a bogon next-hop on all routers that receive the bogons ip route 192.0.2.1 255.255.255.255 Null0 ! ip prefix-list CYMRU-OUT-V4 seq 5 deny 0.0.0.0/0 le 32 8
  • 9. Bogon Filter : Configuration IPv6 router bgp 17821 neighbor 2620:0:6B0::xxxx:xxxx remote-as 65332 neighbor 2620:0:6B0::xxxx:xxxx description CYMRUBOGONS neighbor 2620:0:6B0::xxxx:xxxx ebgp-multihop 255 neighbor 2620:0:6B0::xxxx:xxxx password 7 0458390716775F1A08 neighbor 2620:0:6B0::xxxx:xxxx update-source Loopback0 ! address-family ipv6 neighbor 2620:0:6B0::xxxx:xxxx activate neighbor 2620:0:6B0::xxxx:xxxx soft-reconfiguration inbound neighbor 2620:0:6B0::xxxx:xxxx prefix-list CYMRU-OUT-V6 out neighbor 2620:0:6B0::xxxx:xxxx route-map CYMRUBOGONS-V6 in ! !configure community list to accept the bogon prefixes into the route-map ip community-list 100 permit 65332:17821 ! !configure route-map. Remember to apply it to the proper peering sessions. route-map CYMRUBOGONS-V6 permit 10 description IPv6 Filter bogons learned from cymru.com bogon route-servers match community 100 set ipv6 next-hop 2001:DB8:0:DEAD:BEEF::1 ! !set a bogon next-hop on all routers that receive the bogons ipv6 route 2001:DB8:0:DEAD:BEEF::1/128 Null0 ! ipv6 prefix-list CYMRU-OUT-V6 seq 5 deny ::/0 le 128 9
  • 10. Bogon Filter : Output APNIC-Training-Lab01#show ip bgp 31.22.8.0/21 BGP routing table entry for 31.22.8.0/21, version 175332535 Paths: (1 available, best #1, table default, not advertised to EBGP peer) Advertised to update-groups: 1 Refresh Epoch 1 65332, (received & used) 192.0.2.1 from 38.229.66.20 (38.229.66.20) Origin IGP, localpref 100, valid, external, best Community: 65332:17821 no-export rx pathid: 0, tx pathid: 0x0 10
  • 11. Bogon Filter : Status • The IPv4 fullbogons list is approximately 3,714 prefixes. – [date : 26th January, 2016] • The IPv6 fullbogons list is approximately 65,788 prefixes. – [date : 26th January, 2016] Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd 38.229.xxx.xxx 4 65332 12017 12017 186072391 0 0 1w0d 3733 Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd 2404:A800:xxxx:xx::xxxx 4 9498 3239994 72131 40075514 0 0 3w1d 65788
  • 12. Bogon Filter : Peering • Contact bogonrs@cymru.com 1. Which bogon types you wish to receive (traditional IPv4 bogons, IPv4 fullbogons, and/or IPv6 fullbogons) 2. Your AS number 3. The IP address(es) you want us to peer with 4. Does your equipment support MD5 passwords for BGP sessions? 5. Optional: your GPG/PGP public key • https://www.team-cymru.org/bogon-reference-bgp.html
  • 14. Flow Sonar • The Team Cymru Flow Sonar system is a powerful tool for network managers to visually identify and understand what is happening on their network at any given time • Leveraging the free and open-source framework provided by Peter Haag of SWITCH • Special plugins "dosrannu" developed by Team Cymru to track malicious activity on your network • Unique dosrannu feeds alerted to DDoS attacks, compromised machines, and the presence of connections to C&C hosts
  • 16. Flow Sonar : Get It • Contact outreach@cymru.com 1. Team Cymru will send hardware • 1 Server • 1 Router • https://www.team-cymru.org/Flow-Sonar.html
  • 17. 3. UTRS (Unwanted Traffic Removal Service)
  • 18. RTBH 101 CE IP : 1.2.3.4 BGP : 1.2.3.0/24 PE Transit I Transit II Provider InfraCustomer Infra Website Internet IP : 203.0.113.114 BGP : 203.0.113.0/24
  • 19. RTBH 101 CE IP : 1.2.3.4 BGP : 1.2.3.0/24 PE Transit I Transit II Provider InfraCustomer Infra Website Internet DDoS Traffic DDoS Traffic DDoS Traffic IP : 203.0.113.114 BGP : 203.0.113.0/24
  • 20. RTBH 101 CE IP : 1.2.3.4 BGP : 1.2.3.0/24 PE Transit I Transit II Provider InfraCustomer Infra Website Internet DDoS Traffic DDoS Traffic DDoS Traffic BGP : 1.2.3.4/32 COM : 65420:666 IP : 203.0.113.114 BGP : 203.0.113.0/24 BGP : 203.0.113.0/32 COM : 65420:420
  • 21. RTBH 101 CE IP : 1.2.3.4 BGP : 1.2.3.0/24 PE Transit I Transit II Provider InfraCustomer Infra Website Internet DDoS Traffic BGP : 1.2.3.4/32 COM : 65420:666 IP : 1.2.3.4/32 -> discard IP : 1.2.3.4/32 -> discard IP : 203.0.113.114 BGP : 203.0.113.0/24 BGP : 203.0.113.0/32 COM : 65420:420 IP : 203.0.113.114/32 IP : 203.0.113.114/32
  • 22. RTBH Upstream • Check whether your upsteam provider support RTBH • Configure & Test RTBH before incident • Only announce IPv4 /32's from address space you originate or your customer
  • 23. UTRS • It’s based on the basic principle of DDoS filtering; Remotely Triggered Black Hole Filtering • UTRS is a system that helps mitigate large infrastructure attacks by leveraging: – an existing network of cooperating BGP speakers such as ISPs, hosting providers and educational institutions – that automatically distributes verified BGP-based filter rules from victim to cooperating networks
  • 24. UTRS : Configuration router bgp 17821 neighbor 154.35.xxx.xxx remote-as 64496 neighbor 154.35.xxx.xxx description CYMRUBOGONS-UTRS neighbor 154.35.xxx.xxx ebgp-multihop 255 neighbor 154.35.xxx.xxx transport connection-mode passive neighbor 154.35.xxx.xxx password 7 xxxxxxxxxxxxxxxxxxxxxx neighbor 154.35.xxx.xxx update-source Loopback0 ! address-family ipv4 neighbor 154.35.xxx.xxx activate neighbor 154.35.xxx.xxx send-community neighbor 154.35.xxx.xxx soft-reconfiguration inbound neighbor 154.35.xxx.xxx route-map UTRS-OUT out neighbor 154.35.xxx.xxx route-map UTRS-IN in ! access-list 1 remark utility ACL to deny everything access-list 1 deny any ! ip prefix-list 32-only permit 0.0.0.0/0 ge 32 ip community-list standard RTBH permit 17821:0 ! route-map UTRS-IN permit 10 match ip address prefix-list 32-only route-map UTRS-IN deny 100 match ip address 1 ! route-map UTRS-OUT permit 10 match ip address prefix-list 32-only match community RTBH route-map UTRS-OUT deny 100 match ip address 1 24 ip route 203.176.189.10 255.255.255.255 null0
  • 25. UTRS : Apply • Newly launched service – Quite picky to choose whom to peer – Do organization verification • https://www.team-cymru.org/UTRS/index.html • FAQ: – https://www.cymru.com/jtk/misc/utrs.html
  • 26. How UTRS varies from RTBH with upstream!
  • 27. Other Efforts • NANOG BCOP : DDoS-DoS-attack-BCOP – http://bcop.nanog.org/index.php/DDoS-DoS-attack-BCOP • Routing Resilience Manifesto – Mutually Agreed Norms for Routing Security (MANRS) – https://www.routingmanifesto.org/manrs/
  • 28. 28