Quote:
Originally Posted by Zolo
if you can trace the attacker origin , that would be just great 
can we discuss this ?
lets be realistic , they live on their mitigation solution.
we are now in another subject , is it possible to modify a template so that i can be able to recieve bad post and contact us only.
all my thanks to all
|
If they live on the mitigation solution they sure must be able to log what exactly the ddos is targetting. Once you know the target you can start blocking it one hop each time (server/switch/router).
In principle you only need to block at the highest level to make it stop, then you can start on securing the layers below that.