Skip to content

Download Defense and Detection Strategies against Internet Worms by Jose Nazario PDF

By Jose Nazario

This is often the 1st e-book centred solely on web worms, delivering you strong trojan horse detection and mitigation innovations in your paintings within the box. This ground-breaking quantity permits you to placed emerging computer virus tendencies into standpoint with functional details in detection and security concepts using info from dwell networks, actual IP addresses, and advertisement instruments. The publication is helping you already know the classifications and groupings of worms, and gives a deeper knowing of ways they threaten community and method defense.

After analyzing how a computer virus is built and the way its significant existence cycle steps are applied, the booklet scrutinizes objectives that worms have attacked through the years, and the most likely pursuits of the rapid destiny. furthermore, this designated reference explains tips on how to discover worms utilizing a number of mechanisms, and evaluates the strengths and weaknesses of 3 approaches—traffic research, honeypots and darkish community screens, and signature research. The ebook concludes with a dialogue of 4 potent defenses opposed to community worms, together with host-based defenses, community firewalls and filters, software layer proxies, and an instantaneous assault at the computer virus community itself.

Show description

Read Online or Download Defense and Detection Strategies against Internet Worms PDF

Best networking: internet books

MCAD/MCSD Self-Paced Trainig Kit Developing Xml Web Services and Server Components With Microsoft Visual Basic.Net and Microsoft Visualc#.Net: Exams 70-310 and 70-320

Find out how to construct XML net companies and server parts with MicrosoftR visible BasicR . web and visible C#T . internet? as you arrange for MCAD or MCSD certification. comprises learn consultant for checks 70-310 and 70-320, evaluate software program, book, and checking out software.

From Web to Social Web: Discovering and Deploying User and Content Profiles: Workshop on Web Mining, WebMine 2006, Berlin, Germany, September 18, 2006. Revised Selected and Invited Papers

The realm broad internet is a wealthy resource of knowledge approximately human habit. It containslarge quantity of knowledge organizedvia interconnected internet pages,traces of data seek, consumer suggestions on goods of curiosity, and so on. as well as huge information volumes, one of many vital features of the internet is its dynamics, the place content,structure and usagearechanging through the years.

Extra resources for Defense and Detection Strategies against Internet Worms

Example text

Additional information can be used to determine which attack vector to use against the remote system. The worm network follows the same steps an attacker would, using automation to make the process more efficient. A worm will seek out possible targets and look for vulnerabilities to leverage. If the resulting host services match the known vulnerabilities the worm can exploit, it can then identify it as a system to attack. The criteria for determining vulnerabilities are flexible and can depend on the type of worm attacking a network.

The Slapper worm, for example, was used to build a large army of DDoS zombies. Code Red and the sadmind/IIS worm defaced Web sites in an automated fashion. Various e-mail viruses have sent private documents out into the public at large, affecting both private individuals and government organizations. Hackers seem to have found that worms can automate their work and create large-scale disruptions. 6 Cycles of worm releases 7 These intentions are also important to understand as worms become more widespread.

Code Red reached its peak a day or two after its introduction, and by then many sites knew how to detect its signature and began filtering the hosts and traffic associated with the worm. Sapphire, however, hit its peak in under 5 minutes. There was little time to raise the barriers and withstand the attack. Sites typically were knocked off-line but were back on-line within a few hours, filtering the worm’s traffic. There is typically little time to implement a well-thought-out solution during a worm outbreak.

Download PDF sample

Rated 4.01 of 5 – based on 44 votes