[143745] in North American Network Operators' Group
TDM voice DOS
daemon@ATHENA.MIT.EDU (harbor235)
Tue Aug 16 12:47:15 2011
Date: Tue, 16 Aug 2011 12:46:42 -0400
From: harbor235 <harbor235@gmail.com>
To: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
Anyone been involved with TDM voice DOS attacks? My thoughts are that if the
phone
call originates as an IP call somewhere in the wild, then typical abuse
security incident notifications may help
in the interim. At least potentially identify through customer records or
make them move on where they eventually slip up.
If the abuse originates as IP what obligations do foreign service providers
(friendly?) have to
identify and mitigate? How can the community respond to service providers
who fail to
clean up their customer base?
Mike