Research and Development of Internet Worms

作者: Wen Wei

DOI:

关键词:

摘要: With the explosive growth of network applications and complexity, threat Internet worms against security becomes increasingly serious. Especially under environment Internet, variety propagation ways complexity application result in worm with much higher frequency outbreak, deeper latency more wider coverage, have been a primary issue faced by malicious code researchers. In this paper, concept research situation worms, exploration function component execution mechanism are first presented, then scanning strategies model discussed, finally critical techniques prevention given. Some major problems trends area also addressed.

参考文章(27)
Robert Stone, Dug Song, Rob Malan, A Snapshot of Global Internet Worm Activity ,(2001)
Jose Nazario, Chris Connelly, The Future of Internet Worms ,(2001)
James C. Frauenthal, Mathematical Modeling in Epidemiology ,(1981)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
Niels Provos, A virtual honeypot framework usenix security symposium. pp. 1- 1 ,(2004)
L. Spitzner, Honeypots: Tracking Hackers ,(2002)
James Moscola, Matthew Kulig, John W. Lockwood, Tim Brooks, David Reddick, Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware ,(2003)
Cliff Changchun Zou, Weibo Gong, Don Towsley, Code red worm propagation modeling and analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 138- 147 ,(2002) , 10.1145/586110.586130
Darrell M. Kienzle, Matthew C. Elder, Recent worms: a survey and trends workshop on rapid malcode. pp. 1- 10 ,(2003) , 10.1145/948187.948189