SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAccess to the Internet by the masses has migrated from dial-up only connections to a combination of the former and so-called 'broadband accesses' typically Cable-Modem or Digital Subscriber Line (DSL). While most Internet Service Providers (ISP) now offer these services many of them do not own the underlying telecommunications infrastructure and act as resellers to a larger provider often a phone company. A consequence however of this network arrangement is the split between two distinct parties of the tasks required to allow a subscriber onto the Internet: the DSL provider who is responsible for the physical access and the ISP who is responsible for the authentication or 'logical access'. This situation creates an opportunity for a fraudulent usage of the service and consequently some revenue losses for the ISPs. This document looks at the details of a typical deployment between DSL providers and ISPs in order to highlight the areas of vulnerability of the model. Finally we will suggest an approach to prevent this type of fraud with some other elements that could lead to tailored solutions for the ISPs: as the next sections will demonstrate a unique overall solution is most unlikely given the number of ways each ISP could deploy its services.