scispace - formally typeset
Journal ArticleDOI

Inside the Slammer worm

TLDR
The Slammer worm spread so quickly that human response was ineffective, and why was it so effective and what new challenges do this new breed of worm pose?
Abstract
The Slammer worm spread so quickly that human response was ineffective. In January 2003, it packed a benign payload, but its disruptive capacity was surprising. Why was it so effective and what new challenges do this new breed of worm pose?.

read more

Citations
More filters
Dissertation

Propagation, detection and containment of mobile malware

TL;DR: This dissertation proposes a new behavioral approach for detecting emerging malware targeting mobile handsets based on the concept of generalized behavioral patterns instead of traditional signature-based detection, and demonstrates that the behavioral approach not only has a compact footprint, but also can detect new classes of malware that combine some features from existingclasses of malware.
Proceedings ArticleDOI

Optimal and robust epidemic response for multiple networks

TL;DR: The proportional response that is typically assumed for the classical epidemic model is shown to be sub-optimal and the trade-off between the infection spread and the patching costs in a cost function is captured, leading to an optimal control problem.
Patent

Data mining to identify malicious activity

Joseph Ward, +1 more
TL;DR: In this paper, a monitoring system comprising a processor in communication with a network may monitor network traffic to or from an asset associated with the network and determine whether the network traffic is suspicious network traffic based on the assessed source and or destination and/or content.
Journal ArticleDOI

A monitoring system for detecting repeated packets with applications to computer worms

TL;DR: A monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms, which uses Bloom filters with counters and simulations confirm that this approach can detect worms at early stages of propagation.
Journal ArticleDOI

Counteracting security attacks in virtual machines in the cloud using property based attestation

TL;DR: A novel trust enhanced security model for cloud services that helps to detect and prevent security attacks in cloud infrastructures using trusted attestation techniques and is beneficial for the cloud service providers, cloud customers running tenant virtual machines as well as the customers using the services provided by these tenantvirtual machines.
References
More filters
Proceedings Article

Inferring internet denial-of-service activity

TL;DR: This article presents a new technique, called “backscatter analysis,” that provides a conservative estimate of worldwide denial-of-service activity, and believes it is the first to provide quantitative estimates of Internet-wide denial- of- service activity.
Proceedings Article

How to Own the Internet in Your Spare Time

TL;DR: This work develops and evaluates several new, highly virulent possible techniques: hit-list scanning, permutation scanning, self-coordinating scanning, and use of Internet-sized hit-lists (which creates a flash worm).
Proceedings ArticleDOI

Code-Red: a case study on the spread and victims of an internet worm

TL;DR: The experience of the Code-Red worm demonstrates that wide-spread vulnerabilities in Internet hosts can be exploited quickly and dramatically, and that techniques other than host patching are required to mitigate Internet worms.
Proceedings ArticleDOI

Internet quarantine: requirements for containing self-propagating code

TL;DR: The design space of worm containment systems is described using three key parameters - reaction time, containment strategy and deployment scenario - and the lower bounds that any such system must exceed to be useful today are demonstrated.
Journal ArticleDOI

Inferring Internet denial-of-service activity

TL;DR: In this paper, the authors present a new technique, called backscatter analysis, that provides a conservative estimate of worldwide denial-of-service activity, and quantitatively assess the number, duration and focus of attacks, and qualitatively characterize their behavior.