| ▲ | peanut-walrus 7 hours ago | ||||||||||||||||||||||||||||||||||
What traffic would you request the upstream providers to block if getting hit by Aisuru? Considering the botnet consists of residential routers, those are the same networks your users will be originating from. Sure, in best case, if your site is very regional, you can just block all traffic outside your country - but most services don't have this luxury. Blocking individual IP addresses? Sure, but consider that before your service detects enough anomalous traffic from one particular IP and is able to send the request to block upstream, your service will already be down from the aggregate traffic. Even a "slow" ddos with <10 packets per second from one source is enough to saturate your 10Gbps link if the attacker has a million machines to originate traffic from. | |||||||||||||||||||||||||||||||||||
| ▲ | codedokode 6 hours ago | parent | next [-] | ||||||||||||||||||||||||||||||||||
In many cases the infected devices are in developing countries where none of your customers is. Many sites are regional, for example, a medium business operating within one country, or even city. And even if the attack comes from your country, it is better to block part of the customers and figure out what to do next rather than have your site down. | |||||||||||||||||||||||||||||||||||
| ▲ | amaccuish 7 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||
Could it not be argued that ISPs should be forced to block users with vulnerable devices? They have all the data on what CPE a user has, can send a letter and email with a deadline, and cut them off after it expires and the router has not been updated/is still exposed to the wide internet. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||