Internet Worm Defenses

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
(References)
(References)
Line 21: Line 21:
      
      
[http://ncg.kingston.ac.uk/research/publications/2005/Eurocon2005/Worm/Worm_Modelling_Eurocon_Cyril%20Onwubiko_Submission.pdf. 3. An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms]
[http://ncg.kingston.ac.uk/research/publications/2005/Eurocon2005/Worm/Worm_Modelling_Eurocon_Cyril%20Onwubiko_Submission.pdf. 3. An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms]
 +
 +
[http://meikon.homeip.net/~erika/worm/worm-paper.pdf 4. The Effect of Infection Time on Internet Worm Propagation]
== See also ==
== See also ==

Revision as of 20:58, 6 April 2008

Worms are considered a serious threat against information integrity and service availability. Internet worms have repeatedly exposed and exploited the vulnerabilities of network hosts and the underlying internet architecture. Understanding the principles and patterns of worm propogation is crucial to developing counter measures. Models have been develped to analyse network traffic and the effectiveness of various worm defense mechanisms. This information can be used to select an appropriate defense strategy for worms of different nature.

Contents

Passive Defense

asgasdhahdhash


Active Defense

aaa

Empty Defense

Simple Patch

Spreading Patch

Nullifying Defense

Sniper Defense

References

1. Models of Active Worm Defenses

2. Defense and Detection Strategies against Internet Worms, Jose Nazario

3. An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms

4. The Effect of Infection Time on Internet Worm Propagation

See also

Exteral links

Comparing Passive and Active Worm Defenses

A Network Worm Modeling Package

Internet Worm Propagation Simulators

Worm Blog

Personal tools