[46541] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: How to get better security people

daemon@ATHENA.MIT.EDU (batz)
Wed Apr 3 14:39:22 2002

Date: Wed, 3 Apr 2002 14:31:28 -0500 (EST)
From: batz <batsy@vapour.net>
To: NANOG <nanog@merit.edu>
In-Reply-To: <20020403181906.N17312-100000@apple.silverwraith.com>
Message-ID: <Pine.BSF.4.21.0204031338520.401-100000@vapour.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


On Wed, 3 Apr 2002, Avleen Vig wrote:

:Have a look at SAFE (url in sig).
:We detect smurf amplifiers and I'm currently looking at ways to export
:data to companies regarding large smurf amplifiers (>x250 amplification)
:who refuse to close after X number of warnings.

Yeah, that uses a bit more of the anti-spam model than a network 
protection model. Aris takes IDS logs from subscriber sites, 
normalizes them and generates stats (among other things). After
the data is normalized, they show emerging trends and anomalies.
An example of this would be if an attacker started scanning across
the Internet for ssh servers, this could trigger IDS's at multiple 
sites, which would increase the profile of attackers ip addr. 

What I was suggesting is that this data be cleaned and a list of 
actively hostile hosts be distributed to subscribers for temporary
blockage, either by port filter, or blackholed by prefix on a reasonably
real-time basis.  


--
batz


home help back first fref pref prev next nref lref last post