I had several customers with the same issue. If the DDoS attack is ICMP based you can ask your ISP to limit the ICMP traffic to a small fraction out of your bandwidth. Or you can block completely.
It is always good to identify the sources of the attack. This can be done by enable IP accounting...
Thanks PH,
It was my mistake. A sort at the begining. I understand about 80 % of the body but confused a bit. Could you explain couple of lines especially if(...) anf if(tot).
Thanks again,
meels
Hello vgersh99 and PH,
The code from vgersh99 worked perfectly with nawk. Thanks alot.
The code from PH worked on awk and nawk but didn't give accurate output in either. Here is the output.
Source Destination No'' of Bytes
------ ----------- -------------...
Hello,
I have the following input file:
From To len
===== ========== ===
===== ========== ===
210.255.0.1 10.0.0.101 70
210.255.0.2 10.0.0.103 71
210.255.0.1 10.0.0.101 100...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.