[Dshield] System compromise rates

Rick Klinge rick at jaray.net
Tue Jan 13 17:18:31 GMT 2004


Boy I don't know.. But because of the microsoft holes and such.. Should
windows be included in your malware figures?

~Rick

> -----Original Message-----
> From: list-bounces at dshield.org 
> [mailto:list-bounces at dshield.org] On Behalf Of Pete Cap
> Sent: Tuesday, January 13, 2004 11:08 AM
> To: General DShield Discussion List
> Subject: [Dshield] System compromise rates
> 
> 
> Greetings all,
>  
> I have been tasked with analysing historical trends in 
> malware--discovery rates, longevity, pervasiveness, payload, 
> etc.--and it occurs to me that a similar analysis might be 
> conducted on system compromises...e.g. time and date of 
> compromise, source attributes, target attributes, what was 
> done, and so forth.
>  
> Does anyone know if such data exist?  If so, where?
>  
> Pete
> 
> Chris Brenton <cbrenton at chrisbrenton.org> wrote:
> On Tue, 2004-01-13 at 09:12, David Sentelle wrote:
> > My mail (poor) program won't let me neatly comment inline, my 
> > apologies.
> 
> Ya I hope Novell does not screw up Ximian the same way. ;-)
> 
> > You still need to be aware that those addresses ARE routable, but 
> > should not be allowed inside from outside & vice-versa.
> 
> I think this is the point that people miss. Internet routing 
> will not route _to_ a private address. This does not however 
> stop you from receiving traffic _from_ a private address.
> 
> HTH,
> C
> 

___________________________________________________________________
Virus Scanned and Filtered by http://www.FamHost.com E-Mail System.




More information about the list mailing list