[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-Disclosure] Re: Asynchronous, industry-wide virus naming scheme proposed
- To: full-disclosure@lists.netsys.com
- Subject: [Full-Disclosure] Re: Asynchronous, industry-wide virus naming scheme proposed
- From: Feher Tamas <etomcat@freemail.hu>
- Date: Thu, 2 Oct 2003 16:06:17 +0200 (CEST)
Hello,
>Interesting post... one thing tho, those root "VNS" servers will
>instantly be the target of DDoS attack by the virus writers...
As the root-VNS server need not serve end users, only the vendor-VNS
and maybe vendor-reseller-VNS servers, they could drop any packet
not coming from trusted IP addesses or just use data transmit line that
are not part of the internet.
Protecting vendor-VNS servers against DDoS is up to each AV-vendor,
e.g. they could rent massive capacity at Akamai.net or other huge
datapipe provide. FYIF, McAfee (NAI) already uses Akamai to distribute
its virus signature database updates.
>But I think its a problem that has a non-technological
>solution, if any solution is possible.
Indeed my proposal may be way over-complicated, but I do feel virus
naming must be technology-assisted. Else it will never be uniform and
crackers will reign over the confusion, while innocent, hex-illiterate
computer users continue to suck.
Sincerely: Tamas Feher.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html