nanog mailing list archives
Re: Inter-ISP/Telco/X.25 security procedures?
From: Sean Donelan <sean () donelan com>
Date: Mon, 16 Sep 2002 11:24:35 -0400 (EDT)
On Mon, 16 Sep 2002, Rajesh Talpade wrote:
Could someone please point me to BCP documents or products that permit an ISP to better interact with its peers/upstreams in case of DoS and worm attacks that cross ISP network boundaries?
Please see Clifford Stoll's book The Cuckoo's Egg for a description of tracking an intruder across various PSTN, PSDN and Internet providers. I haven't seen a better description of the process.
Current thread:
- Inter-ISP security procedures? Rajesh Talpade (Sep 16)
- Re: Inter-ISP/Telco/X.25 security procedures? Sean Donelan (Sep 16)
- Re: Inter-ISP/Telco/X.25 security procedures? Valdis . Kletnieks (Sep 16)
- Re: Inter-ISP/Telco/X.25 security procedures? Mark Kent (Sep 16)
- Re: Inter-ISP/Telco/X.25 security procedures? Rajesh Talpade (Sep 16)
- Re: Inter-ISP/Telco/X.25 security procedures? Christopher L. Morrow (Sep 16)
- Re: Inter-ISP/Telco/X.25 security procedures? Sean Donelan (Sep 16)
- Re: Inter-ISP/Telco/X.25 security procedures? Mark Kent (Sep 16)
- Re: Inter-ISP/Telco/X.25 security procedures? Valdis . Kletnieks (Sep 16)
- Re: Inter-ISP/Telco/X.25 security procedures? Craig Partridge (Sep 16)
- Re: Inter-ISP/Telco/X.25 security procedures? Mark Kent (Sep 16)
- Re: Inter-ISP/Telco/X.25 security procedures? Craig Partridge (Sep 16)
- Re: Inter-ISP/Telco/X.25 security procedures? Sean Donelan (Sep 16)