Re: intra-AS messaging for route leak prevention

2016-06-11 Thread Joe Provo
On Fri, Jun 10, 2016 at 10:50:17AM +0200, Job Snijders wrote: > Hi All, > > On Wed, Jun 08, 2016 at 08:48:11AM -0400, Joe Provo wrote: [snip] > > It is useful to note that AS_PATH if often also involved on egress > > decisions. > > You say 'often', but I don't recognise that design pattern from

Re: Netflix banning HE tunnels

2016-06-11 Thread Baldur Norddahl
On 11 June 2016 at 17:04, Mark Felder wrote: > But I can buy my own address space and lie about where it's located at ... > ? > > They have that one covered. They are not going to believe what you enter there either... In fact getting the Geo IP people to accept that address space

Re: Detecting Attacks

2016-06-11 Thread Otto Monnig
Security Onion is a FOSS Linux distribution with several great security tools integrated into an installer. https://security-onion-solutions.github.io/security-onion/ Snort & Suricata are signature based detection tools. Bro is a

Re: Detecting Attacks

2016-06-11 Thread alvin nanog
hi su.. On 06/10/16 at 10:39pm, subashini hariharan wrote: > I am Subashini, a graduate student. I am interested in doing my project in > Network Security. I have a doubt related to it. duh... too broad of a subject ... you'd need to be more specific about which of the hundred's of sub

Re: Detecting Attacks

2016-06-11 Thread Suresh Ramasubramanian
Is your aim to generate attack traffic? Or rather a mix of normal and attack traffic. That's one part. Googling ddos simulator will get you lots of results you can evaluate Logging it appropriately and capturing the logs, storing them in a db is the next. --srs > On 11-Jun-2016, at 10:52

Detecting Attacks

2016-06-11 Thread subashini hariharan
Hello, I am Subashini, a graduate student. I am interested in doing my project in Network Security. I have a doubt related to it. The aim is to detect DoS/DDoS attacks using the application. I am going to use ELK (ElasticSearch, Logstash, Kibanna) for processing the logs (Log Analytics). My

Detecting Attacks

2016-06-11 Thread subashini hariharan
Hello, I am Subashini, a graduate student. I am interested in doing my project in Network Security. I have a doubt related to it. The aim is to detect DoS/DDoS attacks using the application. I am going to use ELK (ElasticSearch, Logstash, Kibanna) for processing the logs (Log Analytics). My

Re: Netflix banning HE tunnels

2016-06-11 Thread Mark Felder
> On Jun 8, 2016, at 10:37, Spencer Ryan wrote: > > It identifys where you told it you are. It doesn't tell Netflix that your > v4 endpoint is in New Zeland and you are watching a bunch of content you > are not supposed to have access to. > > Is this really that hard to