On Thu, Aug 28, 2008 at 1:22 AM, Patrick W. Gilmore <[EMAIL PROTECTED]> wrote:
> Assuming it is in the "wrong" place, you may be able to detect the
> intrusion.  But most people do not run traceroutes all day and watch for it
> to change.  If you run the traceroute after the attack starts, well, how are
> you to know that br01-pos07-$FOO-$BAR is wrong and br03-10GE02-$BLAH-$BAR is
> right?

Uhhh... network monitoring with traceroute and topology tools.   There
are several off-the-shelf varieties to choose from, and I know of
several providers that use them.

-Jim P.

Reply via email to