On Tue, 03 Aug 2004 08:47:57 -0400, Albert Whale
<[EMAIL PROTECTED]> wrote:
> Moving to the Users List.
> 
> >>I guess the issue here Jeff, is that there are a few million injections
> >>of the message before it makes it into the Database.  I want to detect
> >>it as soon as it occurs (and not require that it be relying on any other
> >>device externally for the detection).
> >>
> >>
> >>How does the IP Address make it into the SURBL List?

Hi Albert,

Well if you're talking Phishing Data I would be the person to talk to.
 Data is collected from a reasonable set of information streams
including customer message intercepts, end user reported messages,
spamtraps and a couple of somewhat abstract however effective methods.

If you've got something to report please shoot it to postmaster at
corp.mailsecurity.net.au

> >Well first, SURBLs don't have many IP addresses.  Most entries
> >in the lists are domain names.
> >
> >
> Most Phishers are based on IP Addresses.  Is the SURBL a Good Match, or
> am I attempting to develop a New Detection Tool?

The Phishing list is mainly IP's, we will list whatever the malicious
URL is domain based or otherwise.

> >Second it doesn't take "a few million" messages for an entry
> >to get onto a SURBL list.  For some of the lists it requires
> >only one to be detected.  Please see the Lists document on
> >our site for more information:
> >
> Well, I say a Few million get out of the Phishers, before someone
> reports it.  

You'd be incredibly surprised how fast some are caught.  We're still
working on a 100% reliable 98% automated solution but until then the
updates are still made as submissions arrive.

> I want to detect it, and stop it before needing to rely on
> a first responder acting on behalf of someone else.  I guess I am
> looking for this new Detection tool to be the First Responder.

I'm interested - can you outline what you're planning?

> This certainly is NOT going to replace the lists in the SURBL, but is
> may also permit that this detection could 'feed' data into the SURBL.

Again, tell me more :)

> Back to a previous point.  Since most Phishers are using IP Addresses in
> the Web Link, is there an existing test for this, or do I need to
> develop it?

Reversed octet IP addresses can be fed into SURBL's we use them all
day every day..

-- 
Regards,

David Hooton

Reply via email to