> -----Original Message-----
> From: William Bartholomew [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, 17 January 2001 3:40 
> To: [EMAIL PROTECTED]
> Subject: Attack Quantity/Regularity
> 
> 
> Just a couple of general questions:
> 
> a) How often can a SMALL company expect to be attacked (ie 
> DENIED packets etc?

Denied packets? Several times a day. Port scans will vary, mainly in
proportion to your profile as a company, or your ISP's profile (since they
own the netblocks that people are scanning). Almost all of these "attacks"
will be false positives or untargeted scans - ie _not_ someone trying to
attack your network in particular.

> b) If attacks are regular, and often from the same people, what 
> action should you take?

Notify the abuse contact for the ISP or other netblock owner. Some of them
are fairly co-operative. In almost all cases it's a waste of time, but it
makes you look busy. ;)

> What if it is a variety of people, apart from 
> your firewall how else can you protect yourself?

Some people believe in reactive rulesets that blackhole IP ranges if there
are too many attacks detected from them - this is probably a bad plan for a
number of reasons.

The short answer is, in my opinion, ignore logs from your external filtering
device. The packets are getting dropped anyway, and 99%+ will be false
positives or script kiddiez. Keep logging though - if something bad does
happen you (or someone) might want the verbose logs for forensics.

If you have a Network IDS in your tender underbelly, pay much more attention
to that. One useful trick if you don't have the time / cash for a NIDS but
do have a DMZ is to log packets _leaving_ the DMZ that look suspicious.

> Regards,
> 
> William Bartholomew MCP MCSE CNA CCNA
> Assistant Network Administrator
> Brisbane Boys' College

Cheers,

--
Ben Nagy
Marconi Services
Network Integration Specialist
Mb: +61 414 411 520  PGP Key ID: 0x1A86E304
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to