To secure an access provider, communications to/from the access provider
are monitored for a partially-completed connection transaction. Detected
partially-completed connection transactions are terminated when they
remain in existence for a period of time that exceeds a threshold period
of time. The monitoring may include detecting partially-completed
connection transactions initiated by an access requestor, measuring the
period of time that a partially-completed connection transaction remains
in existence, comparing the period of time with the threshold period of
time, and resetting a communication port located on the access provider.