•How to
suppress an attack if you’re the victim:
Implement
ACL’s at network edges to block ICMP echo responses to your high-visibility hosts, such as IRC servers
Again, will
impair troubleshooting -- “ping” breaks
Will still
allow your access pipes to fill
Work with
upstream providers to determine the help they can provide to you
Blocking ICMP
echoes for high-visibility hosts from coming through your access pipes
Tracing
attacks
•