SlideShare a Scribd company logo
1 of 22
Download to read offline
Handling Internet Network
Abuse Reports at APNIC
21 October 2010
LAP-CNSA Workshop, Melbourne
George Kuo
Overview
• Introduction to APNIC
• Internet registry structure
• Common network abuse questions
APNIC receives
• APNIC Whois Database registration
What is APNIC?
• Internet registry for the Asia Pacific
• One of the five Regional Internet Registries
• Membership-based organization
• Not for profit and services focused
• Internet resource policy coordination body
• Consensus-based policy development
• Open and transparent decision making
APNIC’s Role
• Distributes Internet resources
• Maintains APNIC Whois Database
• Facilitates resource policy development
• Manages Reverse DNS delegations
• But NOT a domain name registry
• Provides training and outreach on resource
management and APNIC services
• Supports Internet development
APNIC from a Global Perspective
Internet Registry Structure
whois
whois.apnic.net
Internet Resource Delegation
APNIC
Delegates
to APNIC Member
APNIC Member
Customer / End User
Delegates
to customers
ISP customer
Delegates
to end-user
/8
APNIC Allocation
/22
Member Allocation
Sub-
Allocation
/24
/26/27 /25
Customer Assignments
/26 /27
Common Questions…
• Why does APNIC appear as the source
in some abuse search reports?
• Can APNIC investigate or stop the
network abuse?
• Can APNIC reclaim the Internet
resources used for the network abuse?
• The contacts information in the APNIC
Whois Database is invalid. What do I do?
Is APNIC the culprit?
• APNIC is listed by ARIN as holder of all
IP space for the AP region
• Some search tools look no further than this
• For details, need to consult APNIC “whois”
• APNIC whois may or may not show
specific customer assignments for the
addresses in question
• But will show the ISP holding APNIC space
Can APNIC stop abuse?
• No, because…
• APNIC is not an ISP and does not provide
network connectivity to other networks
• APNIC does not control Internet routing
• APNIC is not a law enforcement agency
• APNIC has no industry regulatory power
What Can You Do?
• Use the APNIC Whois Database to
obtain network contact information
• Contact the network responsible and also
its ISP/upstream
• Contact APNIC for help, advice, training
or support
How to use APNIC whois
• Web browser
• http://www.apnic.net/whois
• whois client or query tool
• whois.apnic.net
• Identify network contacts from the
registration records
• IRT (Incident Response Team) if present
• Contact persons: “tech-c” or “admin-c”
What if whois info is invalid?
• Members (ISPs) are responsible for
reporting changes to APNIC
• Under formal membership agreement
• Report invalid ISP contacts to APNIC
• http://www.apnic.net/invalidcontact
• APNIC will contact member and update
registration details
What if whois info is invalid?
• Customer assignment information is the
responsibility of ISPs
• ISPs are responsible for updating their
customer network registrations
• Tools such as „traceroute‟, „lookingglass‟
and RIS may be used to track the
upstream provider if needed
• More information available from APNIC
Can APNIC reclaim addresses?
• Sometimes…
• Where IP space has been obtained
fraudulently or under false pretences (which
is often the case)
• But…
• APNIC does not regulate Internet activity
• Current address management policy do not
cover network abuse
APNIC Whois Registration
APNIC Whois Registration
APNIC Whois Registration
APNIC Whois Registration
Questions?
• APNIC Whois inquiry
• www.apnic.net/helpdesk
• More information on network abuse
• www.apnic.net/abuse
• Report invalid contacts
• www.apnic.net/invalidcontacts
• Or
• Send email to helpdesk@apnic.net
You’re invited…
• http://www.apnic.net/meetings
Thanks
George Kuo,
APNIC

More Related Content

What's hot

Government
Government Government
Government
APNIC
 

What's hot (20)

Internet Measurement Networks - SANOG 24
Internet Measurement Networks - SANOG 24Internet Measurement Networks - SANOG 24
Internet Measurement Networks - SANOG 24
 
Whois organization object
Whois organization objectWhois organization object
Whois organization object
 
APNIC Update, NPNOG 0.5
APNIC Update, NPNOG 0.5APNIC Update, NPNOG 0.5
APNIC Update, NPNOG 0.5
 
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities UpdatePacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
PacNOG 18/APNIC Regional Meeting, Guam: APNIC Activities Update
 
APNIC's Resource Certification Service
APNIC's Resource Certification ServiceAPNIC's Resource Certification Service
APNIC's Resource Certification Service
 
IANA Transition Update, August 2016
IANA Transition Update, August 2016IANA Transition Update, August 2016
IANA Transition Update, August 2016
 
APNIC Policy Update, LACNIC 26
APNIC Policy Update, LACNIC 26APNIC Policy Update, LACNIC 26
APNIC Policy Update, LACNIC 26
 
APNIC Update: btNOG 3
APNIC Update: btNOG 3APNIC Update: btNOG 3
APNIC Update: btNOG 3
 
Universal Acceptance: APNIC system readiness
Universal Acceptance: APNIC system readinessUniversal Acceptance: APNIC system readiness
Universal Acceptance: APNIC system readiness
 
RIPE NCC Measurements Tools Workshop: RIPEstat and RIPE Atlas
RIPE NCC Measurements Tools Workshop: RIPEstat and RIPE AtlasRIPE NCC Measurements Tools Workshop: RIPEstat and RIPE Atlas
RIPE NCC Measurements Tools Workshop: RIPEstat and RIPE Atlas
 
npNOG 2: APNIC activity report
npNOG 2: APNIC activity reportnpNOG 2: APNIC activity report
npNOG 2: APNIC activity report
 
IDNOG 2: AS interconnection in indonesia
IDNOG 2: AS interconnection in indonesiaIDNOG 2: AS interconnection in indonesia
IDNOG 2: AS interconnection in indonesia
 
BKNIX Peering Forum: Quick introduction of HKIX
BKNIX Peering Forum: Quick introduction of HKIXBKNIX Peering Forum: Quick introduction of HKIX
BKNIX Peering Forum: Quick introduction of HKIX
 
APNIC Update for ARIN 35
APNIC Update for ARIN 35APNIC Update for ARIN 35
APNIC Update for ARIN 35
 
Strengthen DNS Through Infrastructure Design
Strengthen DNS Through Infrastructure DesignStrengthen DNS Through Infrastructure Design
Strengthen DNS Through Infrastructure Design
 
IPv6 at 6connect, PTC17
IPv6 at 6connect, PTC17IPv6 at 6connect, PTC17
IPv6 at 6connect, PTC17
 
Government
Government Government
Government
 
APNIC Update: Infotel 2014
APNIC Update: Infotel 2014APNIC Update: Infotel 2014
APNIC Update: Infotel 2014
 
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
Universal Acceptance of Internationalized Domain Names (IDN), Email Addresses...
 
IOT, It's the Internet...only bigger
IOT, It's the Internet...only biggerIOT, It's the Internet...only bigger
IOT, It's the Internet...only bigger
 

Viewers also liked

Viewers also liked (20)

IPv6 Tutorial RIPE 60
IPv6 Tutorial RIPE 60IPv6 Tutorial RIPE 60
IPv6 Tutorial RIPE 60
 
DNSSEC/DANE/TLS Testing in Go6Lab
DNSSEC/DANE/TLS Testing in Go6LabDNSSEC/DANE/TLS Testing in Go6Lab
DNSSEC/DANE/TLS Testing in Go6Lab
 
Community Networks: An Alternative Paradigm for Developing Network Infrastruc...
Community Networks: An Alternative Paradigm for Developing Network Infrastruc...Community Networks: An Alternative Paradigm for Developing Network Infrastruc...
Community Networks: An Alternative Paradigm for Developing Network Infrastruc...
 
IPv6 Deployment In Enterprise Networks
IPv6 Deployment In Enterprise NetworksIPv6 Deployment In Enterprise Networks
IPv6 Deployment In Enterprise Networks
 
Spoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized InternetSpoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized Internet
 
Korea IPv6 Measurement
Korea IPv6 MeasurementKorea IPv6 Measurement
Korea IPv6 Measurement
 
Case Studies: TakNet
Case Studies: TakNetCase Studies: TakNet
Case Studies: TakNet
 
Technical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC DeploymentTechnical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC Deployment
 
Japan IPv6 Measurement
Japan IPv6 MeasurementJapan IPv6 Measurement
Japan IPv6 Measurement
 
APNIC Update - MMNOG 2017
APNIC Update - MMNOG 2017APNIC Update - MMNOG 2017
APNIC Update - MMNOG 2017
 
APIX Update
APIX UpdateAPIX Update
APIX Update
 
Supporting Global Discussion: IANA Stewardship Transition
Supporting Global Discussion: IANA Stewardship TransitionSupporting Global Discussion: IANA Stewardship Transition
Supporting Global Discussion: IANA Stewardship Transition
 
Evolving the network for 5G
Evolving the network for 5GEvolving the network for 5G
Evolving the network for 5G
 
Cellular V2X
Cellular V2XCellular V2X
Cellular V2X
 
LPWA – Giving a Voice to Things
LPWA – Giving a Voice to ThingsLPWA – Giving a Voice to Things
LPWA – Giving a Voice to Things
 
Network Automation: Ansible 102
Network Automation: Ansible 102Network Automation: Ansible 102
Network Automation: Ansible 102
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
Valentine's Day
Valentine's DayValentine's Day
Valentine's Day
 
Health and Well-Being on the Social Web
Health and Well-Being on the Social WebHealth and Well-Being on the Social Web
Health and Well-Being on the Social Web
 
DESIGN THE PRIORITY, PERFORMANCE 
AND UX
DESIGN THE PRIORITY, PERFORMANCE 
AND UXDESIGN THE PRIORITY, PERFORMANCE 
AND UX
DESIGN THE PRIORITY, PERFORMANCE 
AND UX
 

Similar to apnic handling-network-abuse

Similar to apnic handling-network-abuse (20)

LEA Workshop dated 09052013
LEA Workshop dated 09052013LEA Workshop dated 09052013
LEA Workshop dated 09052013
 
LEA Workshop 11/12/2013
LEA Workshop 11/12/2013LEA Workshop 11/12/2013
LEA Workshop 11/12/2013
 
APNIC Whois Data Quality: Whose Responsibility?
APNIC Whois Data Quality: Whose Responsibility?APNIC Whois Data Quality: Whose Responsibility?
APNIC Whois Data Quality: Whose Responsibility?
 
APNIC's role in stability and security - 4th APT Cybersecurity Forum
APNIC's role in stability and security - 4th APT Cybersecurity ForumAPNIC's role in stability and security - 4th APT Cybersecurity Forum
APNIC's role in stability and security - 4th APT Cybersecurity Forum
 
PacNOG 23: APNIC Regional Update
PacNOG 23: APNIC Regional UpdatePacNOG 23: APNIC Regional Update
PacNOG 23: APNIC Regional Update
 
UN INCB: RIRs and LEAs
UN INCB: RIRs and LEAsUN INCB: RIRs and LEAs
UN INCB: RIRs and LEAs
 
What is APNIC: Infotel 2014
What is APNIC: Infotel 2014What is APNIC: Infotel 2014
What is APNIC: Infotel 2014
 
PCTA Convention 2023: APNIC Introduction
PCTA Convention 2023: APNIC IntroductionPCTA Convention 2023: APNIC Introduction
PCTA Convention 2023: APNIC Introduction
 
PCTA Convention 2023: APNIC Introduction
PCTA Convention 2023: APNIC IntroductionPCTA Convention 2023: APNIC Introduction
PCTA Convention 2023: APNIC Introduction
 
Your feedback for APNIC Services
Your feedback for APNIC ServicesYour feedback for APNIC Services
Your feedback for APNIC Services
 
APNIC Member Services
APNIC Member ServicesAPNIC Member Services
APNIC Member Services
 
APNIC IRM Tutorial, by Sheryl Hermoso [APRICOT 2015]
APNIC IRM Tutorial, by Sheryl Hermoso [APRICOT 2015]APNIC IRM Tutorial, by Sheryl Hermoso [APRICOT 2015]
APNIC IRM Tutorial, by Sheryl Hermoso [APRICOT 2015]
 
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
 
09 (IDNOG01) Introduction about APNIC by Wita Laksono
09 (IDNOG01) Introduction about APNIC by Wita Laksono09 (IDNOG01) Introduction about APNIC by Wita Laksono
09 (IDNOG01) Introduction about APNIC by Wita Laksono
 
Apnic-irme
Apnic-irmeApnic-irme
Apnic-irme
 
Law Enforcement engagement capacity building
Law Enforcement engagement capacity buildingLaw Enforcement engagement capacity building
Law Enforcement engagement capacity building
 
Supporting RIPE NCC's vision with training and certification
Supporting RIPE NCC's vision with training and certificationSupporting RIPE NCC's vision with training and certification
Supporting RIPE NCC's vision with training and certification
 
APNIC Update: PacNOG 22
APNIC Update: PacNOG 22APNIC Update: PacNOG 22
APNIC Update: PacNOG 22
 
23rd PITA AGM and Conference: APNIC Community - how you can be involved?
23rd PITA AGM and Conference: APNIC Community - how you can be involved?23rd PITA AGM and Conference: APNIC Community - how you can be involved?
23rd PITA AGM and Conference: APNIC Community - how you can be involved?
 
APNIC Whois Database Updates
APNIC Whois Database Updates APNIC Whois Database Updates
APNIC Whois Database Updates
 

More from APNIC

More from APNIC (20)

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

apnic handling-network-abuse

  • 1. Handling Internet Network Abuse Reports at APNIC 21 October 2010 LAP-CNSA Workshop, Melbourne George Kuo
  • 2. Overview • Introduction to APNIC • Internet registry structure • Common network abuse questions APNIC receives • APNIC Whois Database registration
  • 3. What is APNIC? • Internet registry for the Asia Pacific • One of the five Regional Internet Registries • Membership-based organization • Not for profit and services focused • Internet resource policy coordination body • Consensus-based policy development • Open and transparent decision making
  • 4. APNIC’s Role • Distributes Internet resources • Maintains APNIC Whois Database • Facilitates resource policy development • Manages Reverse DNS delegations • But NOT a domain name registry • Provides training and outreach on resource management and APNIC services • Supports Internet development
  • 5. APNIC from a Global Perspective
  • 7. Internet Resource Delegation APNIC Delegates to APNIC Member APNIC Member Customer / End User Delegates to customers ISP customer Delegates to end-user /8 APNIC Allocation /22 Member Allocation Sub- Allocation /24 /26/27 /25 Customer Assignments /26 /27
  • 8. Common Questions… • Why does APNIC appear as the source in some abuse search reports? • Can APNIC investigate or stop the network abuse? • Can APNIC reclaim the Internet resources used for the network abuse? • The contacts information in the APNIC Whois Database is invalid. What do I do?
  • 9. Is APNIC the culprit? • APNIC is listed by ARIN as holder of all IP space for the AP region • Some search tools look no further than this • For details, need to consult APNIC “whois” • APNIC whois may or may not show specific customer assignments for the addresses in question • But will show the ISP holding APNIC space
  • 10. Can APNIC stop abuse? • No, because… • APNIC is not an ISP and does not provide network connectivity to other networks • APNIC does not control Internet routing • APNIC is not a law enforcement agency • APNIC has no industry regulatory power
  • 11. What Can You Do? • Use the APNIC Whois Database to obtain network contact information • Contact the network responsible and also its ISP/upstream • Contact APNIC for help, advice, training or support
  • 12. How to use APNIC whois • Web browser • http://www.apnic.net/whois • whois client or query tool • whois.apnic.net • Identify network contacts from the registration records • IRT (Incident Response Team) if present • Contact persons: “tech-c” or “admin-c”
  • 13. What if whois info is invalid? • Members (ISPs) are responsible for reporting changes to APNIC • Under formal membership agreement • Report invalid ISP contacts to APNIC • http://www.apnic.net/invalidcontact • APNIC will contact member and update registration details
  • 14. What if whois info is invalid? • Customer assignment information is the responsibility of ISPs • ISPs are responsible for updating their customer network registrations • Tools such as „traceroute‟, „lookingglass‟ and RIS may be used to track the upstream provider if needed • More information available from APNIC
  • 15. Can APNIC reclaim addresses? • Sometimes… • Where IP space has been obtained fraudulently or under false pretences (which is often the case) • But… • APNIC does not regulate Internet activity • Current address management policy do not cover network abuse
  • 20. Questions? • APNIC Whois inquiry • www.apnic.net/helpdesk • More information on network abuse • www.apnic.net/abuse • Report invalid contacts • www.apnic.net/invalidcontacts • Or • Send email to helpdesk@apnic.net