1 / 13

### ARIN Resource Management and Fraud Reporting Process Overview ###

This document outlines ARIN's initiatives, including user story creation, resource revocations, and a detailed fraud reporting process. It provides an overview of the current focus areas, such as processing Q&A and POCs, and highlights the importance of reporting suspected fraud involving Internet number resources. Additionally, it describes the procedure for submitting fraud reports, the investigation protocol, and the quarterly publication of findings. Resources and reporters remain confidential, promoting transparency in ARIN’s operations while ensuring the integrity of the resource allocation process. ###

elewa
Download Presentation

### ARIN Resource Management and Fraud Reporting Process Overview ###

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Registration Services Leslie Nobile

  2. RSD Team Principal Resource Analyst Cathy Clements Resource Analysts Doreen Maraffa Sue Dobert Mike Pappano Lisa Liedel Giselle Falla Technical Specialist David Huberman Senior Resource Analyst Jon Worley

  3. Current Focus • ARIN On-line • Creating “user stories” and features for future releases • Now processing Q&A and POCs • Legacy RSA • 30, 60, 90 day follow up • Resource Revocations • Fraud Activity and Reports • And business as usual of course…

  4. Fraud Reporting Process • To report suspected Internet number resource fraud as it relates to ARIN’s mission and scope • e.g. - Utilization reporting, hijacking, transfers, or similar activity directly involving fraudulent submissions to ARIN or fraudulent changes to data in ARIN’s WHOIS • Three part process • Submission via web form at: https://www.arin.net/public/fraud/index.xhtml • Investigationby staff, all information collected kept confidential • Reporting of research results published quarterly

  5. Fraud Reporting Results • Brief description of the fraud reports and findings published quarterly at: https://www.arin.net/resources/fraud/results/index.html • Reporter and resources in question remain anonymous • Since March 2009, total of 43 reports submitted • 39 involved phishing, spam, identity theft, hacking, stalking, network abuse, etc. • 4 involved suspected fraudulent activity against ARIN • None resulted in resource reclamation • Have just begun using resource review policy (NRPM 12) in cases where there’s no fraud but still evidence of resource misappropriation

  6. *Returned = Voluntarily by registrant *Revoked = For non-payment *Reclaimed = For fraud, misappropriation, or business dissolution

  7. Issuing Recycled Address Space Current Practice: • All recovered address space held for at least 1 year prior to re-issuing • Just prior to re-issue, check routing tables. If routed, contact org asking them to stop • Check some known RBL operators to see if block is listed. If yes, contact the RBL operator (when possible). If listed by multiple operators who we can’t contact, will pull the block and add back to bottom of hold list for additional year. • Publish daily RSS feed that lists all space issued each day and all space released from the 1 year hold • http://lists.arin.net/pipermail/arin-issued/rss.xml

  8. Is there an increased demand for IPv4 space?For IPv6 space?

  9. IPv4 Requests Received

  10. IPv4 Addresses Issued (/24s)

  11. IPv6 Requests Received

  12. IPv6 Allocations Issued (/32s)

More Related