WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode, Washington, DC, USA, October 27, 2003, Co-located with CCS 2003 |
Contents
Access For Sale | 19 |
Experiences with Worm Propagation Simulations | 34 |
Modeling the Effects of Timing Parameters on Virus Propagation | 61 |
Copyright | |
1 other sections not shown
Common terms and phrases
access tickets access-for-sale worm active address space analysis anomaly detection attack bandwidth buffer overflow Code Red v2 Code Red worm Computer computer worm connection copies covert channels defenses DIB:S DIB:S/TRAFEN distributed DOME dport e-mail worms effective environment epidemic threshold Equation exploit Figure file sharing worms graph ICMP identify IEEE implemented infected hosts infected nodes infection delay Internet worm IP addresses KE-model large number machine malicious code malware Microsoft monitoring Morris worm Nimda obfuscated obfuscated code packet parameters payload port preprocessing step protocol random scanning routers runtime scale-free networks scan rate Section servers simple epidemic model Slammer worm software executables speed Staniford strategy susceptible hosts target host techniques toolkits topology traditional worms Trojan horses USENIX user vigilance virus vulnerable hosts WCTC Win32 API calls Windows file sharing worm agent worm algorithm worm authors worm detection worm sets worm spreading worm's