作者: Vern Paxson , Stuart Staniford , Nicholas Weaver
DOI:
关键词:
摘要: The ability of attackers to rapidly gain control vast numbers Internet hosts poses an immense risk the overall security Internet. Once subverted, these can not only be used launch massive denial service floods, but also steal or corrupt great quantities sensitive information, and confuse disrupt use network in more subtle ways. We present analysis magnitude threat. begin with a mathematical model derived from empirical data spread Code Red I July, 2001. discuss techniques subsequently employed for achieving greater virulence by II Nimda. In this context, we develop evaluate several new, highly virulent possible techniques: hit-list scanning (which creates Warhol worm), permutation enables self-coordinating scanning), Internet-sized hit-lists flash worm).