hosters vs. malware: best practices
DESCRIPTION
Presentation to the RIPE Anti-Abuse Working Group at RIPE63 in Vienna, November 2011. Covers adopting best practices to handle malware and other forms of network abuse for hosting providers and network operatorsTRANSCRIPT
![Page 1: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/1.jpg)
BLACKNIGHT
Hosters vs. Malware: Best Practices
Domain Registrar – Hosting Provider
![Page 2: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/2.jpg)
BLACKNIGHT
Michele Neylon Founder / CEO Blacknight Contact: http://mneylon.tel @mneylon / @blacknight http://www.blacknight.com http://michele.me/blog
![Page 3: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/3.jpg)
BLACKNIGHT
Overview Why does it matter?
Some Guidelines / Best Practices
![Page 4: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/4.jpg)
BLACKNIGHT
![Page 5: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/5.jpg)
BLACKNIGHT
Security Issues / Abuse are not going away
Apathy is NOT an option Self-regulation vs Regulation + govt
intervention Image / brand / reputation => You
value them, don’t you?
![Page 6: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/6.jpg)
BLACKNIGHT
![Page 7: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/7.jpg)
BLACKNIGHT
Self-regulation => control remains with industry => retain control of destiny
Govt. Regulation => industry input possibly ignored => lose control of destiny
![Page 8: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/8.jpg)
BLACKNIGHT
![Page 9: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/9.jpg)
BLACKNIGHT
Abuse desk best practices => not rocket science
No need to think – someone’s already developed some
StopBadware (http://stopbadware.org/best-practices/web-hosting-providers)
![Page 10: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/10.jpg)
![Page 11: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/11.jpg)
StopBadWare Action Flow
1. Acknowledge report2. Evaluate report3. Pass on the report4. Mitigate5. Resolve6. Notify reporter7. Track8. Review
![Page 12: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/12.jpg)
![Page 13: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/13.jpg)
BLACKNIGHT
![Page 14: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/14.jpg)
BLACKNIGHT
![Page 15: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/15.jpg)
BLACKNIGHT
![Page 16: Hosters vs. Malware: Best Practices](https://reader035.vdocuments.mx/reader035/viewer/2022070315/5555c2bdd8b42afe5d8b53ac/html5/thumbnails/16.jpg)
BLACKNIGHT
Questions? Complaints? Photo credits: IStockPhoto http://www.flickr.com/photos/forbairt
/