anti-spam vs network abuse

Rob Thomas robt at cymru.com
Sat Mar 1 03:20:41 UTC 2003


Hi, NANOGers.

] and conversely, all attacks are not preceded by scanning.

Very true.  Most of the attack activity I monitor does not include
scanning activity or any other reconnaissance.  However, those who
attack often enjoy monitoring their progress.  This can be an
interesting (albeit difficult) way to trace back the attack to the
sources.

Thanks,
Rob.
-- 
Rob Thomas
http://www.cymru.com
ASSERT(coffee != empty);





More information about the NANOG mailing list