Intrusion Detection Systems mailing list archives
Re: mouse trap + fight back!
From: JohnNicholson () aol com (JohnNicholson () aol com)
Date: Tue, 16 May 2000 16:10:13 EDT
Archive: http://msgs.securepoint.com/ids FAQ: http://www.ticm.com/kb/faq/idsfaq.html IDS: http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html UNSUBSCRIBE: email "unsubscribe ids" to majordomo () uow edu au In addition to the ethical concerns that have been voiced about "fighting back", there are legal concerns, as well. If you launch some kind of retaliatory attack against a site that either did not know that it was being used for an attack or, even worse, that was not involved and you attacked by mistake, you could be violating US federal laws if you do damage to that site. You could become the very thing you are trying to fight against. The better ways to fight are both slower, but more effective in the long run: 1) Honey pots. Use them to gather evidence that will allow the authorities to track down the person who is attacking you. 2) Internal policies and procedures. Understand how your system can be attacked. Educate users. Have policies and procedures in place that enable you to identify and respond to an attack, including gathering evidence and working with the authorities. 2) Policy/philosophy change. There has been a lot written about getting people to change their philosophy from "Anything outbound/Restricted inbound" to "Restricted outbound/Restricted inbound." If you can get your company, your company's partners, your ISP, etc. to start taking more responsibility for what goes out from their networks, then we can go a long way towards making things more secure for everyone. Just my $0.02
Current thread:
- Re: mouse trap + fight back! JohnNicholson () aol com (May 16)
- <Possible follow-ups>
- RE: mouse trap + fight back! Meritt, Jim (May 17)
- Re: mouse trap + fight back! bacano (May 18)
- Re: RE: mouse trap + fight back! JohnNicholson () aol com (May 17)
