Home |
Search |
Today's Posts |
|
#1
|
|||
|
|||
Kevin A. Cannon
READ THIS YOU CROSS-POSTING MORONS. YOU'RE ROAD-KILL.
------ Subject: I TOLD YOU SO--ISP's UNITING TO KILL USENET GANGS ---- justice-for-all wrote: 3-28-05 THIS IS THE TEXT VERSION..I WILL PASTE THE LINK ON NEXT. IT IS IMPERATIVE THAT YOU SEND THIS ARTICLE TO YOUR ISP AND NEWSREADER REQUESTING THAT THEY JOIN THIS EFFORT TO KILL OFF THE USENET GANG'S DOMAINS; AND THE POSTER'S PERMANENTLY REMOVED FROM ANY POSTING ON THE INTERNET-USENET GROUPS. SEND COPIES "WITH HEADERS" OF THOSE GANG MEMBERS WHO HAVE POSTED TO ACA AS "PROOF OF THEIR INTENTIONAL AND MALICIOUS DESTRUCTION OF JUST THIS ONE GROUP. THEN...SEND THIS TO THE "OTHER GROUPS" WHICH YOU POST TO AND GET THE BALL ROLLING. I WILL BE POSTING MORE ARTICLES ABOUT THIS ISP MOVEMENT. IF YOU DON'T PARTICIPATE "NOW"..YOU ARE A SLUG.-SYLVIA --- TEXT OF ARTICLE: A community for coordinated, rapid attack resolution The Fingerprint Sharing Alliance is a coalition of telecommunications companies around the globe that are stamping out cyber attacks that cross company boundaries, continents and oceans. Distributed denial-of-service (DDoS) attacks, worms, and other cyber attacks can paralyze even the most well structured network for days, costing millions of dollars in lost sales, freezing online services and crippling a company's reputation. Hacker-controlled bot nets can be used to attack a Web site or network on command, requiring little effort to knock a company off-line. According to a recent report published in Cisco Packet Magazine, more than 30,000 computers are "recruited" into botnets everyday. To date, resolving these threats across service provider networks is reactive and relationship-driven, consisting of a combination of phone calls and emails between colleagues. Attack resolution requires real-time cooperation and coordination between service providers to identify a compromised or infected system as close to the absolute Internet ingress as possible. The community of service providers that are participating in the Fingerprint Alliance will be sharing cyber attack profiles, or "fingerprints" to stop attacks more quickly and closer to the source. This is the first time worldwide telecommunications ------------------------------ -------------------- companies have been able to share attack profiles ------------------------------ ------------------ automatically, -------------- allowing providers to consistently protect one another and their customers from today's distributed threats. With the formation of the Fingerprint Alliance, a formerly laborious and tedious process has been replaced with an efficient and automated process, and a larger community can be engaged to solve significant threats to the Internet. How does it work? --------------- Arbor Networks added the Fingerprint sharing capability to Peakflow SP to allow companies to share attack fingerprints automatically without revealing any competitive information. Peakflow SP does this by collecting data from devices around the network, which is then correlated to allow service providers to baseline the network and detect any deviations from normal, which are then flagged as anomalous. It is then determined whether the anomaly is a legitimate flash crowd, for instance during an on-line event, or a malicious attack. Network operators are then able to decide whether to mitigate it or to leave it alone. When it's determined to be a malicious attack, Peakflow SP will then generate the fingerprint the service provider would share automatically and securely with select peers. The network administrator has absolute control over who will receive the shared fingerprint and the networks do not need to be adjacent. The recipients of the fingerprint have the option to accept or reject the sharing request when the incoming fingerprint is received. Using Peakflow SP, Service Provider A detects and mitigates a DDoS attack. Service Provider A automatically sends the attached "fingerprint" to the relevant upstream providers affected by the attack. After securely receiving the fingerprint, the information is used by the upstream ISP to traceback, analyze, and mitigate the attack, thereby identifying and removing compromised hosts as close to the internet ingress points as possible. Who is involved in the alliance? ------------------------------ -- Some of the largest telecommunications companies in the world are participating, including: Asia Netcom British Telecom Broadwing Cisco Systems Earthlink Energis Internet2 ITC^DeltaCom MCI Merit Network NTT Communications University of Pennsylvania The Planet Rackspace Managed Hosting Utah Educational Networks Verizon Dominicana WilTel Communications XO Communications ---- LINK TO ARTICLE: Subject:Arbor Networks, Inc.-3-28-05 "FINGERPRINTING" RE HACKING OF ISP'S=20 http://www.arbor.net/fingerpri nt-sharing-alliance.php =A0 |
Thread Tools | Search this Thread |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Forum | |||
"When the heat got on..." | General | |||
Kerry 'loose cannon' says ex-commander | ASA | |||
Toss your Spanish Olives overboard! | ASA | |||
Best Deck Gun? | ASA |