Title: Session 3 Response Measure
1Session 3Response Measure
2Traceback Attacks to the Source
3Traceback Essentials
4Traceback Valid IPv4 Source Addresses
5Traceback Valid IPv4 Source Addresses
6Traceback Spoofed IPv4 Addresses
7Traceback via Hop by Hop Technique
8Traceback via Hop by Hop Technique
9Traceback via the Jump to Ingress Technique
10Traceback via the Jump to Ingress Technique
11Traceback Spoofed IPv4 Addresses
12Traceback with ACLs
13Traceback with ACLs
14Traceback with Netflow
15Traceback with Netflow
16show ip cache flow
17Traceback with Netflow
18Traceback with Netflow
19Traceback with Netflow
20Backscatter Traceback Technique
21Backscatter Traceback Technique
22Backscatter Traceback Technique
23Backscatter Traceback Preparation
24Backscatter Traceback Preparation
25Backscatter Traceback Preparation
26Backscatter Traceback Preparation
27Backscatter Traceback Preparation
28Backscatter Traceback Preparation
29Backscatter Traceback Preparation
30Backscatter Traceback Activation
31Backscatter Traceback Activation
32Backscatter Traceback Activation
33Backscatter Traceback Activation
34Backscatter Traceback Activation
35Backscatter Traceback Activation
36Traceback with Edge Probes
37Traceback Summary
38React to the Attack
39Reaction Tools
40Reacting to an Attack with CAR
41Reacting to an Attack with CAR
42Reacting to an Attack with CAR
43Reacting to an Attack with CAR
44Reacting to an Attack with CAR with Remote Trigger
45Reacting to an Attack with CAR with Remote Trigger
46Reacting to an Attack with CAR with Remote Trigger
47Reacting to an Attack with CAR with Remote Trigger
48Detect Affirm
49Sink Hole Router
50Sink Hole Architecture
51Example slapper worm 2002.9
52Sink Hole Detect worm
53Track DoS Attack
54IRR Network Information
55IRR AS
56IP Source Tracker
57IP Source Tracker
58IP Source Tracker configure
59Use Netflow
60Show Ip Cache Flow
61Show IP cache verbose flow
62Use ACL to Track
63Use IXP to track
64ICMP Unreachable
65How to find router drop packet
66ICMP back scatter
67ICMP back scatter
68ICMP back scatter
69Track DoS summary
70Anti Dos DDos measure
71Remote Triggered Black Hole
72Remote Triggered Black Hole
73Remote Triggered Black Hole
74Remote Triggered Black Hole
75Remote Triggered Black Hole
76Triggered source address drop packet
77Loose uRPF
78Source based remote triggered black hole
79Source based remote triggered black hole
80Date Cleanout
81Departure from the victim
82Remote triggered rate limit
83Summary
84What can we do?
85Suggestion
86Other notion