||Recovery from Network Element Resource Saturation Attack: If the control plane is under attack, Service Providers and Network Operators should: 1) Turn on logging where appropriate to analyze the logs, 2) Implement the appropriate filter and access list to discard the attack traffic 3) Utilize DoS/DDoS tracking methods to identify the source of attack.
||Cable; Internet/Data; Wireless
||Service Provider; Network Operator
||Cyber Security;Disaster Recovery;Emergency Preparedness;
||IETF RFC2350, CMU/SEI-98-HB-001. Note: This Best practice could impact 9-1-1 operations.