Skip to main content
FastNetMon detects 38 Gbps of UDP reflection traffic aimed at one of the ISP’s hosted customer prefixes. The NOC needs to confirm the attack, activate upstream mitigation with the ISP’s transit providers, protect the rest of the subscribers without blackholing the victim unnecessarily, and keep the customer informed so they don’t see their own website blackholed and open a panic ticket.

Systems involved

SystemRole
FastNetMonSource detection.
NetFlow / sFlow collectorsConfirm pattern, identify attack signature.
Core routers (Juniper MX / Cisco ASR)BGP flowspec, RTBH, policer announcements.
Transit provider portals (Cogent, Lumen, Telia)Upstream scrubbing request.
Cloudflare Magic Transit / Arbor TMSScrubbing centre diversion.
Slack #securityInternal channel.
Customer portal / GmailCustomer-facing comms.
Splynx / SonarCustomer record and contact lookup.

Walkthrough

1

Confirm the attack signature

FastNetMon raises the alarm. Copilot pulls the NetFlow top-flows, confirms UDP reflection on source ports 123 and 11211, and identifies the destination prefix — a single /28 hosted for a customer named ACME Gaming.
2

Decide the mitigation posture

The prefix is hosting live game-matchmaking. RTBH blackholes the customer, which is the attacker’s goal. Copilot proposes transit scrubbing first, flowspec policer second, RTBH last-resort — and lists the phone numbers for each transit provider’s NOC.
3

Engage transit scrubbing

Through the Lumen scrubbing connector, request diversion for the affected /28. Cogent has no connector yet — Copilot drafts the email template with attack signature, prefix, customer identifier, and contact phone.
4

Push flowspec at the edge

SSH to the core routers. Stage the flowspec rule: drop UDP/123 and UDP/11211 traffic to the victim prefix. Approval prompt shows the exact match and action. Push and monitor.
5

Notify the customer

Copilot pulls the customer’s technical contact from Splynx and drafts a short email through Gmail: attack detected, scrubbing active, their service may see brief rerouting, the NOC is monitoring, next update in 30 minutes. Sent.
6

Internal channel

Open a Slack thread in #security with the timeline, flow samples, scrubbing status, the customer contact state, and the escalation tree. Every action in the incident posts there automatically.
7

Monitor effectiveness

Copilot watches the FastNetMon attack-graph and the core-router interface counters. Scrubbing brings the attack from 38 Gbps to 180 Mbps of legitimate traffic within six minutes.
8

De-escalate

When the attack falls below the policer threshold for 15 minutes, withdraw the scrubbing diversion, remove the flowspec rule in reverse order, and validate the customer’s service is normal. Send the customer the all-clear email.
9

Post-event report

Generate a Markdown attack-event report: timeline, peak bps and pps, signature, mitigations applied, effectiveness curve, recommendations. Attach to the internal ticket and email to the customer for their records.

Where Studio earns its keep

  • The decision — scrub vs. flowspec vs. RTBH — happens with the customer’s service impact visible on the same screen as the attack signature.
  • Transit-provider engagement happens from inside the workspace with the exact attack details ready to paste, not from scratch in a browser.
  • The customer gets a coherent update before they file a panic ticket, which preserves the relationship.
  • The post-event report writes itself from the flow data and the action timeline, which is the artifact insurance and regulators want.

AI Copilot

Keep Planning mode on while DDoS decisions are active — every action deserves a visible approval.

Connectors and MCP

FastNetMon, transit scrubbing portals, and Splynx as connector calls.