[52111] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Inter-ISP/Telco/X.25 security procedures?

daemon@ATHENA.MIT.EDU (Sean Donelan)
Mon Sep 16 11:25:08 2002

Date: Mon, 16 Sep 2002 11:24:35 -0400 (EDT)
From: Sean Donelan <sean@donelan.com>
To: nanog@merit.edu
In-Reply-To: <200209161446.KAA10944@vagrant.research.telcordia.com>
Errors-To: owner-nanog-outgoing@merit.edu


On Mon, 16 Sep 2002, Rajesh Talpade wrote:
> Could someone please point me to BCP documents or products that permit
> an ISP to better interact with its peers/upstreams in case of DoS and
> worm attacks that cross ISP network boundaries?

Please see Clifford Stoll's book The Cuckoo's Egg for a description
of tracking an intruder across various PSTN, PSDN and Internet providers.

I haven't seen a better description of the process.


home help back first fref pref prev next nref lref last post