Craig A. Huegen <chuegen@cisco.com>
Smurf Attack Description & Supression
NANOG 11
8
Prevention Techniques
•
If you do become a bounce site:
Trace the traffic streams to the edge of your network, and
work with your upstream or peer in order to track the
stream further
MCI’s DoSTracker tool
Manual tracing/logging tips
•