ip-protection icon indicating copy to clipboard operation
ip-protection copied to clipboard

Bad Actor Identification

Open webdevelopers-eu opened this issue 7 months ago • 4 comments

In our current setup, we rely on Intrusion Detection Systems (IDS) and firewalls to identify and block malicious IP addresses temporarily to mitigate pending attacks. These systems are crucial for protecting our networks and are extremely effective against various bots and script kiddies...

However, if attackers use hidden and/or shared IP addresses with legitimate users, our traditional approach to blocking these IPs could become ineffective. How will these security measures adapt to ensure they can still protect against threats without inadvertently affecting legitimate users who might be sharing the same IP for anonymity purposes?

webdevelopers-eu avatar Jul 23 '24 11:07 webdevelopers-eu