What is the best way to log DoS/DDoS attacks?
Does anyone have any advice on what I can do to try and appropriately log the attacking addresses?
1 Reply
While this does generate less data than capturing packet dumps, with sufficient volume it can still fill up your disk. If this is a problem, you could consider getting a second Linode in the same datacenter and using it as a remote syslog target.