Access "Spammers drive organizations to block Internet traffic to stop attacks"
This article is part of the January 2004 issue of IDSes takes aim: Emerging "target-based" systems improve intrusion defense
At the rate we're going, it won't be long. Patience is waning quickly, anger is building, and, when that process reaches a critical point, we may just see one of the greatest steps backward in the last few decades: The doors of the Internet will start slamming shut. I'm talking about the simple refusal to accept traffic. Suppose you're running an ISP -- a big one -- and you're bombarded daily with DDoS traffic, spam of all kinds and perpetual poking into your networks with hacking tools. And, suppose you can identify some of the major sources of all this spew coming your way. What can you do? You've tried filters. You've tried jawboning the source ISPs. You've tried the law. And you've tried setting policy for your users. The net effect? The load and its ugly contents just keeps getting bigger. Your patience wears thin, and eventually you just slam the door. You block Internet traffic simply by its identifiable source. An unheard of idea? Think again. We already do it with email. You have two basic options: You look in the header, and react to the address, ... Access >>>
Premium Content for Free.
'Targeted' perimeter defense improves network-based intrusion detection systems
by Joel Snyder, Contributor
Target-based IDSes squelch network noise to pinpoint the alerts you really care about. We review three solutions to see if they hit the bull's-eye.
Microsoft Trustworthy Computing causes strategic conflict around security
by Lawrence M. Walsh
Two years into Trustworthy Computing, the software giant faces the daunting challenge of winning and keeping customers while grappling with periodic setbacks.
Ron Rivest, RSA Algorithm Creator, discusses issues with micropayments
by Andrew Briney
Legendary cryptographer Ron Rivest has a reputation for tackling "hard" security problems. Up next: Micropayments.
- 'Targeted' perimeter defense improves network-based intrusion detection systems by Joel Snyder, Contributor
Passive scanning: A new take on network vulnerability scanning
by Joel Snyder, Contributor
Learn about the benefits and risks of passive network vulnerability scanning.
Business continuity roles improve security incident management
by Fred Trickey
IT personnel may be front-line responders, but if they "own" incident management, your enterprise is at risk. Here's a business blueprint for an effective security incident management program with business continuity roles.
Review: RSA ClearTrust 5.5 secure federated identity management system
by George Wrenn
RSA ClearTrust 5.5 eases the administration of securing Web services identity management across business partners' systems.
- Passive scanning: A new take on network vulnerability scanning by Joel Snyder, Contributor
Secure coding essential to risk mitigation planning
by Andrew Briney, Information Security magazine
Information Security magazine's editorial director Andrew Briney talks about the lack of incentive for making code more secure.
Examining hacker bounty pros and cons: Do they stop computer hackers?
A hacker bounty could create a new benchmark for hackers to measure themselves, so do bounties stop computer hackers?
Understanding the Open Systems Interconnection model
by Jay Heiser, Contributor
It's time to take the Open Systems Interconnection (OSI) model up a notch to the human layer.
Spammers drive organizations to block Internet traffic to stop attacks
by Dana W. Paxson
Spammers and hackers are driving organizations -- and nations -- to block Internet traffic in order to stop attacks.
- Secure coding essential to risk mitigation planning by Andrew Briney, Information Security magazine
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...