Craig A. Huegen <chuegen@cisco.com>
Smurf Attack Description & Supression
NANOG 11     8
Prevention Techniques
•If you do become a bounce site:
Trace the traffic streams to the edge of your network, and work with your upstream or peer in order to track the stream further
MCI’s DoSTracker tool
Manual tracing/logging tips
•