Internet Worm Defenses
From Computing and Software Wiki
(→References) |
(→References) |
||
Line 16: | Line 16: | ||
=== Sniper Defense === | === Sniper Defense === | ||
== References == | == References == | ||
- | [http://www.amazon.com/exec/obidos/ASIN/1580535372/me20-20?creative=327641&camp=14573&link_code=as1 Defense and Detection Strategies against Internet Worms, Jose Nazario ] | + | [http://www.linklings.net/MOSES/papers/ipsi-236.pdf 1. Models of Active Worm Defenses] |
+ | |||
+ | [http://www.amazon.com/exec/obidos/ASIN/1580535372/me20-20?creative=327641&camp=14573&link_code=as1 2. Defense and Detection Strategies against Internet Worms, Jose Nazario ] | ||
+ | |||
+ | [http://ncg.kingston.ac.uk/research/publications/2005/Eurocon2005/Worm/Worm_Modelling_Eurocon_Cyril%20Onwubiko_Submission.pdf. 3. An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms] | ||
== See also == | == See also == |
Revision as of 20:56, 6 April 2008
Worms are considered a serious threat against information integrity and service availability. Internet worms have repeatedly exposed and exploited the vulnerabilities of network hosts and the underlying internet architecture. Understanding the principles and patterns of worm propogation is crucial to developing counter measures. Models have been develped to analyse network traffic and the effectiveness of various worm defense mechanisms. This information can be used to select an appropriate defense strategy for worms of different nature.
Contents |
Passive Defense
asgasdhahdhash
Active Defense
aaa
Empty Defense
Simple Patch
Spreading Patch
Nullifying Defense
Sniper Defense
References
1. Models of Active Worm Defenses
2. Defense and Detection Strategies against Internet Worms, Jose Nazario
3. An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms
See also
Exteral links
Comparing Passive and Active Worm Defenses
A Network Worm Modeling Package