Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleOctober 2004
WORM vs. WORM: preliminary study of an active counter-attack mechanism
WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcodePages 83–93https://doi.org/10.1145/1029618.1029631Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combined with security measures that inadequately scale, worms will continue to ...
- ArticleOctober 2004
Preliminary results using scale-down to explore worm dynamics
WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcodePages 65–72https://doi.org/10.1145/1029618.1029628A major challenge when attempting to analyze and model large-scale Internet phenomena such as the dynamics of global worm propagation is finding appropriate abstractions that allow us to tractably grapple with size of the artifact while still capturing ...
- ArticleOctober 2004
Toward understanding distributed blackhole placement
WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcodePages 54–64https://doi.org/10.1145/1029618.1029627The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because there are no legitimate hosts in an unused address block, traffic must be the ...
- ArticleOctober 2004
The top speed of flash worms
WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcodePages 33–42https://doi.org/10.1145/1029618.1029624Flash worms follow a precomputed spread tree using prior knowledge of all systems vulnerable to the worm's exploit. In previous work we suggested that a flash worm could saturate one million vulnerable hosts on the Internet in under 30 seconds[18]. We ...
- ArticleOctober 2004
ACT: attachment chain tracing scheme for email virus detection and control
WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcodePages 11–22https://doi.org/10.1145/1029618.1029621Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the society by disrupting the normal information flow and collecting or destroying ...
- ArticleOctober 2004
A study of mass-mailing worms
WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcodePages 1–10https://doi.org/10.1145/1029618.1029620Mass-mailing worms have made a significant impact on the Internet. These worms consume valuable network resources and can also be used as a vehicle for DDoS attacks. In this paper, we analyze network traffic traces collected from a college campus and ...