Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security The Internet IT

NETI@home Data Analyzed 155

An anonymous reader writes "The NETI@home Internet traffic statistics project (featured in Wired and Slashdot previously) has a quick analysis on the malicious traffic they observed. It's a rough world out there." Perhaps not suprising, but still disheartening, the researchers find among other things that a large portion of typical end-user traffic consists of malicious connection attempts.
This discussion has been archived. No new comments can be posted.

NETI@home Data Analyzed

Comments Filter:
  • by nizo ( 81281 ) * on Monday April 25, 2005 @03:00PM (#12339379) Homepage Journal
    Does anything like this exist already? It would be nice if I could filter, say, ssh traffic coming from "known" naughty sites, and report sites that portscan me, though probably I should look at using smartcards or something more secure at this point. I can't just restrict the ssh port at the firewall, since people could be coming in from pretty much anywhere because of travel to remote sites. Aside from complaining to upstream providers (which so far has yielded zero responses) when I see people banging away at ssh, I don't see much else I can do.
  • Re:Considering.. (Score:2, Interesting)

    by Nos. ( 179609 ) <andrewNO@SPAMthekerrs.ca> on Monday April 25, 2005 @03:03PM (#12339410) Homepage

    Oh, so there should be a central hub where the virus/worm can talk to other copies of itself. Any place it could talk to itself would quickly be located and shutdown. Besides, I don't think the writers of these kinds of programs are really concerned with your network utilization.

    Most of the malicious type traffic I'm seeing lately (aside from SPAM) is ssh worms trying to log into my boxes. Most boxes are set to only allow ssh from a few IPs or subnets, but I have one that I block class A's anytime I see a worm trying to get in. I've got about 1/2 the IP space blocked right now.

    It would be like setting up a massive feedback loop on a mail server. When user X gets message X, he passes message X to user Y, who upon receiving message X sends it back to user X
    I remember a Banyan mail system I worked with. In the event that you set up a vacation (while I'm out) type mail minder and we're near your mailbox limit, it was possible to start and endless loop of a mailbox full notifications (mailbox full notifications were allowed even if the limit was reached).

  • by Nos. ( 179609 ) <andrewNO@SPAMthekerrs.ca> on Monday April 25, 2005 @03:11PM (#12339497) Homepage
    It might be worthwhile to look at setting up some sort of a webbased authentication system that would dynamically allow an IP address or subnet for a certain amount of time. Block everything, but if your customer/employee/whatever needs in, they can authenticate via a webpage which would then update your firewall rules.
  • by GPLDAN ( 732269 ) on Monday April 25, 2005 @03:11PM (#12339508)
    It's good to know the IP addresses of machines active searching dark IP space. If you can see those statistics in real time, you have useful information.

    ISPs are already starting to work together on this type of information. If an ISP sees malicious worm spreading behavior, it can upload the offending IP into a global db that all ISPs can use to block at their borders.

    Again, the authors conclusions are that nothing beats having a nice dark block to trigger alerts.
  • by jfengel ( 409917 ) on Monday April 25, 2005 @03:20PM (#12339588) Homepage Journal
    Sadly, while some customers might get motivated to learn something, others would just be motivated to switch ISPs. Which costs the ISPs money, which means that they won't do it.

    At least such is their thought process as often presented. I suspect it's bad cost-benefit analysis; if your dumber customers leave, it's probably a net win for you. Smarter customers mean less bandwidth (at least, they don't act as spam zombies maxing out the bandwidth) and fewer tech support hours explaining how to fix the cup holder.

    The big players (AOL, Comcast) are the best targets for this logic, but they live for those left-side-of-the-bell-curve customers. They're the "default" ISPs that people get because they're so readily available, so they get all the customers who don't know better. (Hell, I don't know better; I use Verizon for my DSL but I don't let them do anything but provide me bits.)

    So AOL and Comcast are in a bit of a bind; they don't want these customers, but they don't want to lose them, either. I think that they're probably going to have to use gentle persuasion to say, "Hey, it looks like you've a spam zombie. Please call your cousin's best friend to clean the crap off your computer again and give you a stern talking-to. And please stop downloading Bonzi Buddy."
  • by Mr.Sharpy ( 472377 ) on Monday April 25, 2005 @03:34PM (#12339707)
    The ISP KNOWS the physical addresses of the cable/dsl modem a home user has. It's not like the ISP has no idea which ip addresses are home user or account is using at any given time. How do you think they can reliably (for the most part) identify people for the likes of the RIAA when they ask. Likewise, with modern hardware and software its a pretty trivial task for an ISP to turn your internet access down to a crawl or off with the click of a button. They can do this, they just don't want to.

    Maybe it would be a good idea to throttle the users down to a bare minimum and redirect all http traffic to a gateway page to tell them they have a problem with their computer they need to correct. It seems to work for wireless access points in hotels/airports/coffeeshops. Why can't big ISPs do the same thing?
  • by Mr.Sharpy ( 472377 ) on Monday April 25, 2005 @06:07PM (#12341502)
    It seems like ISPs are going to have to make a choice between increased costs due to the insane amounts of traffic caused by spyware and malware, or the cost of the loss of some customers. The whole point of such a strategy is to notify the customer and help him correct the problem if necessary. Customers with problems that would be caught by the gateway page would probably call support anyway, wondering why their connections are so slow. If they're not calling, they're probably complaining quietly about the ISPs crappy service. Tools like the one this article covers can be used to reduce to a minimum the number of false positives identified by the ISP because they have a good profile of problem traffic.

    This should be an issue the industry should tackle together. Due the nature of broadband in most markets, these customers aren't really going to have many service alternatives either if they don't like the way their ISP is trying to help them help themselves. If the major players make it known that they won't let their customers unknowingly crush the internet under the load of their spyware and malware riddled boxen, it would go a long way to making a dent in the problem.

Remember to say hello to your bank teller.

Working...