16 Sep
2002
16 Sep
'02
11:24 a.m.
On Mon, 16 Sep 2002, Rajesh Talpade wrote:
Could someone please point me to BCP documents or products that permit an ISP to better interact with its peers/upstreams in case of DoS and worm attacks that cross ISP network boundaries?
Please see Clifford Stoll's book The Cuckoo's Egg for a description of tracking an intruder across various PSTN, PSDN and Internet providers. I haven't seen a better description of the process.