[XML-DEV Mailing List Archive Home] [By Thread] [By Date] [Recent Entries] [Reply To This Message]

RE: Can A Web Site Be Reliably Defended Against DoS Attacks?


stop spam dos attacks
layers on layers...

a box at the perimeter simply becomes the target.

this is the same problem as trying to stop junk snail mail. if you've
got a letterbox, you'll get it.

i'm not talking about spam here - although it's largely the same
problem. if you've got a publicly accessible service, you can't stop the
public accessing it.... and if they abuse it - spam, DoS (and frineds
DDoS etc) all you can do is try to limit the abuse.

that's simply because you can't tell the friendlies until you look at
the content.

now if you could tell what's coming before it got here, that would be
good.

rick

On Fri, 2004-02-06 at 09:03, Bullard, Claude L (Len) wrote:
> Thanks Chris.  That is certainly interesting as well 
> s the other research he is doing.  In discussing the 
> DDoS challenge with engineers here, I hear similar 
> proposals (that is, as much as I can determine from 
> the short description of 'anycast') where a box 
> at the perimeter shields the rest of the network. 
> If he has a generalized solution, that sounds 
> like a money maker.
> 
> I would think these issues would be of some concern 
> to an industry obsessed with web services.  Currently, 
> we keep them in the Intranet and are very careful to 
> assess any kind of service that is on the Internet 
> with regards to criticality.  We can do that.  I 
> have to wonder about industries that have some 
> wide-eyed vision of 'seamlessness' and 'just in time'. 
> It seems like driving ahead of the headlights.
> 
> len
> 
> 
> From: Chris Wilper [mailto:cwilper@c...]
> 
> Maybe something on the horizon from Paul Francis (the NAT guy):
> 
> ". . . The IP Internet was simply not designed to repel this kind of attack.
> We are looking at an architecture for an anycast-based DDoS perimeter than
> can be incrementally deployed at the edge of the network.  In this
> architecture, IP anycast is used to force packets to travel through the
> boxes
> that constitute the perimeter, thus protecting servers from direct attack.
> We believe that this architecture can be extended to provide DDoS protection
> to all Internet users."
> http://www.cs.cornell.edu/People/francis/
> 
> -----------------------------------------------------------------
> The xml-dev list is sponsored by XML.org <http://www.xml.org>, an
> initiative of OASIS <http://www.oasis-open.org>
> 
> The list archives are at http://lists.xml.org/archives/xml-dev/
> 
> To subscribe or unsubscribe from this list use the subscription
> manager: <http://lists.xml.org/ob/adm.pl>
> 


PURCHASE STYLUS STUDIO ONLINE TODAY!

Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced!

Buy Stylus Studio Now

Download The World's Best XML IDE!

Accelerate XML development with our award-winning XML IDE - Download a free trial today!

Don't miss another message! Subscribe to this list today.
Email
First Name
Last Name
Company
Subscribe in XML format
RSS 2.0
Atom 0.3
 

Stylus Studio has published XML-DEV in RSS and ATOM formats, enabling users to easily subcribe to the list from their preferred news reader application.


Stylus Studio Sponsored Links are added links designed to provide related and additional information to the visitors of this website. they were not included by the author in the initial post. To view the content without the Sponsor Links please click here.

Site Map | Privacy Policy | Terms of Use | Trademarks
Free Stylus Studio XML Training:
W3C Member
Stylus Studio® and DataDirect XQuery ™are products from DataDirect Technologies, is a registered trademark of Progress Software Corporation, in the U.S. and other countries. © 2004-2013 All Rights Reserved.