Stats from a Network Surveillance System 12
LogError writes "Sombria ("shadowy" in Portuguese) is a honeypot system set up in Tokyo, Japan, that is intended for network surveillance and research and not for production purposes. This paper provides some statistics and an overview of the most prominent attacks from May through July 2003."
Damn, these hackers are brazen. (Score:2, Funny)
Isn't anybody prosecuting, or at a minimum letting folks know when they've backtraced through all the compromised hosts they're hopping through that they're on to them?
Also interesting to note the number of hackers in Poland (well, it says you can't tell the nationality, so Polish machines I guess.)
summary of some of the more interesting parts... (Score:5, Interesting)
Re:summary of some of the more interesting parts.. (Score:5, Insightful)
Sure wish there was more economic incentive for Poland, Romania, and Brazil not to crack systems, but to help build out and defend networks instead.
The problem is that putting up a compromisable host on the Internet is relatively easy and the costs of the compromised system are not born entirely by the owner of the system, but are shared by everyone else on the network that might become victim of a DDoS, congestion, spam, etc.
I really only see a couple of ways of dealing with this.
One, have a central authority scan for vulnerabilities and have the authority to fine and /or shutdown net access for systems that endanger network health.
Two, institute distributed white hat scans that either shutdown the host, install patches forcible after some time.
It makes sense to require anyone using a common resource like the Internet to agree to responsible behavior and accept punishment for irresponsible behavior, such as running vulnerable systems. Just like food service workers that get tested for communicable diseases or drivers that require licenses, the commons of the Internet should also be protected.
Re:summary of some of the more interesting parts.. (Score:5, Insightful)
There's also the age old question of logistics. How do you require anything of anybody living in a foriegn country whose government couldn't care less about some faceless citizen sending out viruses faster than a two-dollar hooker, or who leaves his smtp server open? We'll need a "world government" before we can approach that one. And that might be a long time coming. The kind of control you're talking about seems to be way too centralized to me (yes, I know that's your point).
Of course there's always vigilante action. Who's with me in forming a coalition of superheros who travel the globe, righting wrongs and avenging bad computing practices? ARRR!
Re:summary of some of the more interesting parts.. (Score:2)
As for logistics, considering that the majority of internet sites are located in a handful of countries and the backbones are (mostly) a handful of companies/institutions, it would not be difficult to put pressure on countries which failed to comply.
The Internet is just another pub
And the conclusion. (Score:5, Interesting)
But there is hope. A always keep your system upgraded. The vulnarabilities exploited are all well known. No "new" attacks were found by this honey pot. So if this system had been patched it would have had 0 intrusions. (Or I am readigng it wrong)
Also don't install stuff you don't need. Openssl support for apache may be very usefull as is samba. But for most sites this is not needed. Had these two optionals not been installed then again there would have been 0 intrusions.
Stay uptodate and limit the machine to the software needed and nothing more. Oh well off to post this to my boss who keeps insisting on FTP access because it is so much easier then SCP.
Re:And the conclusion. (Score:2, Informative)
For Windows there is the excellent WinSCP [sourceforge.net] which is a GUI wrapper around SCP.
For Unix you can use the zssh program, or an FTP like wrapper for SCP whos name I've forgotten..
Makes me more security conscious... (Score:2)
One of the many reasons I let others do my web and email hosting...
-Adam
What's with Thursdays? (Score:5, Interesting)
From this and from biased speculation based on no facts at all, I'm going to conclude that the contributions to numbers of attacks are being made mostly by US-based script kiddies who can't stay up doing stuff on a school night. (Consider the time zone difference between the US and Japan - actually, now that I look at it, the 7-8AM time spike is right for the trouble source to be European. Hrm...)
Re:What's with Thursdays? (Score:1)
Interesting correlations (Score:3, Interesting)
Could this mean an attacker could disguise itself as a worm with this technique?
But then again, it seems that almost every attack was performed by a script kiddie.