LinkBack Thread Tools Search this Thread Display Modes
  #1   Report Post  
justice-for-all
 
Posts: n/a
Default Kevin A. Cannon

READ THIS YOU CROSS-POSTING MORONS. YOU'RE ROAD-KILL.
------
Subject: I TOLD YOU SO--ISP's UNITING TO KILL USENET GANGS

----
justice-for-all wrote:
3-28-05
THIS IS THE TEXT VERSION..I WILL PASTE THE LINK ON NEXT.


IT IS IMPERATIVE THAT YOU SEND THIS ARTICLE TO YOUR ISP AND

NEWSREADER
REQUESTING THAT THEY JOIN THIS EFFORT TO KILL OFF THE USENET GANG'S
DOMAINS; AND THE POSTER'S PERMANENTLY REMOVED FROM ANY POSTING ON THE


INTERNET-USENET GROUPS.


SEND COPIES "WITH HEADERS" OF THOSE GANG
MEMBERS WHO HAVE POSTED TO ACA AS "PROOF OF THEIR INTENTIONAL AND
MALICIOUS DESTRUCTION OF JUST THIS ONE GROUP.


THEN...SEND THIS TO THE
"OTHER GROUPS" WHICH YOU POST TO AND GET THE BALL ROLLING.


I WILL BE POSTING MORE ARTICLES ABOUT THIS ISP MOVEMENT.


IF YOU DON'T PARTICIPATE "NOW"..YOU ARE A SLUG.-SYLVIA
---
TEXT OF ARTICLE:
A community for coordinated, rapid attack resolution


The Fingerprint Sharing Alliance is a coalition of telecommunications


companies around the globe that are stamping out cyber attacks that
cross company boundaries, continents and oceans.


Distributed denial-of-service (DDoS) attacks, worms, and other cyber
attacks can paralyze even the most well structured network for days,
costing millions of dollars in lost sales, freezing online services

and
crippling a company's reputation.
Hacker-controlled bot nets can be used to attack a Web site or

network
on command, requiring little effort to knock a company off-line.
According to a recent report published in Cisco Packet Magazine, more


than 30,000 computers are "recruited" into botnets everyday.
To date, resolving these threats across service provider networks is
reactive and relationship-driven, consisting of a combination of

phone
calls and emails between colleagues.
Attack resolution requires real-time cooperation and coordination
between service providers to identify a compromised or infected

system
as close to the absolute Internet ingress as possible.
The community of service providers that are participating in the
Fingerprint Alliance will be sharing cyber attack profiles, or
"fingerprints" to stop attacks more quickly and closer to the source.



This is the first time worldwide telecommunications
------------------------------ --------------------
companies have been able to share attack profiles
------------------------------ ------------------
automatically,
--------------
allowing providers to consistently protect one another and their
customers from today's distributed threats.
With the formation of the Fingerprint Alliance, a formerly laborious
and tedious process has been replaced with an efficient and automated


process, and a larger community can be engaged to solve significant
threats to the Internet.


How does it work?
---------------
Arbor Networks added the Fingerprint sharing capability to Peakflow

SP
to allow companies to share attack fingerprints automatically without


revealing any competitive information.
Peakflow SP does this by collecting data from devices around the
network, which is then correlated to allow service providers to
baseline the network and detect any deviations from normal, which are


then flagged as anomalous.
It is then determined whether the anomaly is a legitimate flash

crowd,
for instance during an on-line event, or a malicious attack.
Network operators are then able to decide whether to mitigate it or

to
leave it alone.
When it's determined to be a malicious attack, Peakflow SP will then
generate the fingerprint the service provider would share

automatically
and securely with select peers.
The network administrator has absolute control over who will receive
the shared fingerprint and the networks do not need to be adjacent.
The recipients of the fingerprint have the option to accept or reject


the sharing request when the incoming fingerprint is received.
Using Peakflow SP, Service Provider A detects and mitigates a DDoS
attack.
Service Provider A automatically sends the attached "fingerprint" to
the relevant upstream providers affected by the attack.
After securely receiving the fingerprint, the information is used by
the upstream ISP to traceback, analyze, and mitigate the attack,
thereby identifying and removing compromised hosts as close to the
internet ingress points as possible.


Who is involved in the alliance?
------------------------------ --
Some of the largest telecommunications companies in the world are
participating, including:


Asia Netcom
British Telecom
Broadwing
Cisco Systems
Earthlink
Energis
Internet2
ITC^DeltaCom
MCI
Merit Network
NTT Communications
University of Pennsylvania
The Planet
Rackspace Managed Hosting
Utah Educational Networks
Verizon Dominicana
WilTel Communications
XO Communications

----
LINK TO ARTICLE:
Subject:Arbor Networks, Inc.-3-28-05 "FINGERPRINTING" RE HACKING OF
ISP'S=20
http://www.arbor.net/fingerpri nt-sharing-alliance.php =A0

 
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules

Smilies are On
[IMG] code is Off
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
"When the heat got on..." NOYB General 255 January 20th 05 06:24 PM
Kerry 'loose cannon' says ex-commander Anonymous Sender ASA 2 May 7th 04 03:04 AM
Toss your Spanish Olives overboard! Capt.American ASA 20 April 6th 04 06:56 PM
Best Deck Gun? Jeff Morris ASA 168 July 7th 03 12:09 AM


All times are GMT +1. The time now is 06:44 AM.

Powered by vBulletin® Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 BoatBanter.com.
The comments are property of their posters.
 

About Us

"It's about Boats"

 

Copyright © 2017