[143745] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

TDM voice DOS

daemon@ATHENA.MIT.EDU (harbor235)
Tue Aug 16 12:47:15 2011

Date: Tue, 16 Aug 2011 12:46:42 -0400
From: harbor235 <harbor235@gmail.com>
To: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Anyone been involved with TDM voice DOS attacks? My thoughts are that if the
phone
call originates as an IP call somewhere in the wild, then typical abuse
security incident notifications may help
in the interim. At least potentially identify through customer records or
make them move on where they eventually slip up.

If the abuse originates as IP what obligations do foreign service providers
(friendly?) have to
identify and mitigate? How can the community respond to service providers
who fail to
clean up their customer base?


Mike

home help back first fref pref prev next nref lref last post