davidh
April 30th, 2008, 06:59 PM
All those log lines allow the ISC to correlate and analyze data to see if an Internet security storm is under way. It also provides some insight into just how much bad traffic is on the Internet today and how fast it can hit users.
One of the most interesting data points for Sachs is one that tracks how quickly a new computer logging on to the Internet for the first time will see some form of bad traffic.
"It now only takes four of five minutes from the time you first connect until you get evil," Sachs said. "That's scary -- a year or two ago it used to be in the 20-minute era."
http://www.internetnews.com/infra/article.php/3743866
DH
One of the most interesting data points for Sachs is one that tracks how quickly a new computer logging on to the Internet for the first time will see some form of bad traffic.
"It now only takes four of five minutes from the time you first connect until you get evil," Sachs said. "That's scary -- a year or two ago it used to be in the 20-minute era."
http://www.internetnews.com/infra/article.php/3743866
DH