IDG News Service - An Internet standards group has approved an electronic crimes reporting format, which may eventually give security researchers a cohesive, broad set of data to gauge online crime.
The Internet Engineering Task Force (IETF) approved a customized version of the XML-based Instant Object Description Exchange Format (IODEF). Extensions have been added to it that are appropriate for creating standard e-crime reports.
The format allows for unambiguous time stamps, support for different languages and a feature to attach samples of malicious code. It solves the problem facing the security industry of inconsistent reports, which make it harder to spot trends and react faster.
It is hoped that organizations hit by Internet crime such as banks will be able to mine a centralized database that holds the reports. If a bank is experiencing an attack, it could query the database to find out ranges of IP (Internet Protocol) addresses that have been used for offenses such as phishing attacks.
Further queries could determine if other banks have been hit by attacks and analyze spam messages to see if there are common patterns in the grammar or if the attacks originate from a certain area. All of the information could then be used to contact ISPs to take steps to stop the abuse.
The Anti-Phishing Working Group, which has been instrumental in developing the reporting format, plans to run a trial to see how organizations can share the data in the format. One of the goals is to see if one organization can use reports from another without further communication, according to a paper on APWG's website. Two parties have typically had to communicate several times to sort out issues such as the actual time of an event, because of time zone differences.
"Actually, data exchanges will help to refine the operational, policy and procedural issues that appear whenever a data exchange question arises," according to the APWG document.
The data would be transferred between two parties via e-mail. Another goal is to see if the reporting format can support different languages. Many e-crime reports have been written by non-native speakers of English, which has been difficult given the highly technical nature of e-crime, the APWG said.
Send news tips and comments to email@example.com
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts