Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation
Information in this chapter:
▪ Research and Due Diligence
▪ Implementing a Solution
Products, Tools, and Methods:
▪ Visual Studio (C#/Visual Basic for Applications)
▪ TMG Logging to SQL Server
This chapter illustrates how to create database objects to represent every country's individual ranges of IP addresses, and how to use this data to create individual sets of TMG computer objects to use for rule sets.
Keywords: TMG, Geolocation, SQL, Blocking Malicious Traffic
Years back, while working on a research project involving SQL Slammer and the persistence of vulnerable installations around the globe, I ...