Back to Results
First PageMeta Content
Welchia / Anti-worm / SQL Slammer / Witty / Code Red / Blaster / Morris worm / Computer virus / Stack buffer overflow / Malware / System software / Computer worms


WORM vs. WORM: Preliminary Study of an Active Counter-Attack Mechanism ∗† Frank Castaneda ˜
Add to Reading List

Document Date: 2004-11-02 14:39:42


Open Document

File Size: 245,73 KB

Share Result on Facebook

City

CR / An IDS / Washington / DC / /

Company

Intrusion Detection Systems / eEye / Computer-Communication Networks / MSBlaster / Symantec Corp. / Microsoft Corporation / IBM / McAfee Network Security Technologies Group / ACM Press / /

Country

United States / /

Currency

USD / /

/

Facility

TCP port / Computer Science† North Carolina State University / UDP port / using TCP / /

IndustryTerm

well known site / Anti-virus software / real Internet / suspicious systems / opcode search.html / patch-management systems / vulnerable server / patch management infrastructure / worm propagation algorithms / re-generation algorithm / target network / invasive software / web.lemuria.org/ security/ / network management tools / automated strike-back technology / virtual network / patch management tools / web server / download site / trial-anderror search algorithm / Internet community / detection systems / network communications / overall network / software vendors / Internet worm / Internet quarantine / proposed Internet CDC / transformation algorithms / Internet ecology / software vendor level / heuristic based algorithm / search algorithm / proposed Internet-scale antiworm / Internet Center / search algorithms / remote server / computer systems / software updating / anti-worm generation algorithm / Internet counterpart / online hosts / Automatic patching systems / corporate network / prototype anti-worm generation algorithm / payload search algorithm / sequential search / network management / hardware technology / internet virus / Internet Information Server / /

OperatingSystem

VMs / Windows XP / Microsoft Windows / Microsoft Windows 2000 / Linux / DoS / /

Organization

Center for Disease Control / navy / North Carolina State University / United States Marine Corps / /

Person

D. Moore / V / S. Staniford / V / Nicholas Weaver / Honey Pot / Jun Xu / /

Position

General / worm author / /

Product

Microsoft Corporation Portable Audio Device / Code-Red I / /

ProgrammingLanguage

XML / Microsoft SQL Server / /

PublishedMedium

Communications of the ACM / IEEE Spectrum / /

Technology

Virtual PC / XML / search algorithm / Linux / CMP / transformation algorithms / automated strike-back technology / optimising worm propagation algorithms / Virtual Machine / AV / re-generation algorithm / search algorithms / anti-worm generation algorithm / hardware technology / UDP / Operating Systems / Anti-virus software / prototype anti-worm generation algorithm / payload search algorithm / application protocols / DNS / trial-anderror search algorithm / firewall / heuristic based algorithm / HTTP / IPv4 / simulation / web server / /

URL

www.securityfocus.com / www.hammerofgod.com / www.rootkit.com / www.cs.berkeley.edu / www.lsd-pl.net / www.theregister.com / www.metasploit.com / www.infoworld.com / www.caida.org / www.eeye.com / www.digitaloffense.net / /

SocialTag