Intrusion Detection Systems mailing list archives

Re: mouse trap + fight back!


From: JohnNicholson () aol com (JohnNicholson () aol com)
Date: Tue, 16 May 2000 16:10:13 EDT


Archive: http://msgs.securepoint.com/ids
FAQ: http://www.ticm.com/kb/faq/idsfaq.html
IDS: http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html
UNSUBSCRIBE: email "unsubscribe ids" to majordomo () uow edu au
In addition to the ethical concerns that have been voiced about "fighting 
back", there are legal concerns, as well.  If you launch some kind of 
retaliatory attack against a site that either did not know that it was being 
used for an attack or, even worse, that was not involved and you attacked by 
mistake, you could be violating US federal laws if you do damage to that 
site.  You could become the very thing you are trying to fight against.

The better ways to fight are both slower, but more effective in the long run:

1) Honey pots.  Use them to gather evidence that will allow the authorities 
to track down the person who is attacking you.

2) Internal policies and procedures.  Understand how your system can be 
attacked.  Educate users.  Have policies and procedures in place that enable 
you to identify and respond to an attack, including gathering evidence and 
working with the authorities.

2) Policy/philosophy change.  There has been a lot written about getting 
people to change their philosophy from "Anything outbound/Restricted inbound" 
to "Restricted outbound/Restricted inbound."  If you can get your company, 
your company's partners, your ISP, etc. to start taking more responsibility 
for what goes out from their networks, then we can go a long way towards 
making things more secure for everyone.

Just my $0.02


Current thread: