Until the above mentioned update, the integrated firewall was setup to
perform the basic service of rejecting and logging incoming packet which
are not part of an already established connection. Such packets are
usually part of an attempt to enter the network or scan it.
Data gathered from such logs make it possible for us to prepare
statistics of most frequent "attackers" and use them further in our
research. However, it does not allow us to protect users from other
kinds of problems in which the connection is either already established
or comes from inside the network, for example from an infected device.
In order to improve the firewall in this area, we added two new
functions:
1/ we started to log communication with known centers of botnets for
which public records exists,
2/ we started to block access to addresses that are hosting malicious
content active on Czech websites.
We have worked on both these functions closely with the CSIRT.CZ team, which provides us with data for blocking
of malware hosting hosts and for botnet centers.
Blocking of malicious content is based on the fact that Czech websites
injected with malware usually do not host it themselves, but rather …