1 / 11

CIS 442- Chapter 3

CIS 442- Chapter 3. Worms. Worms. Biological and computer worms Definition, main characteristics Differences from Viruses Bandwidth consumption and speed of propagation DOS attack. Code Red I. History of first Worm Vulnerability : IIS Payload or Damage Nature of access Propagation.

kendra
Download Presentation

CIS 442- Chapter 3

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CIS 442- Chapter 3 Worms

  2. Worms • Biological and computer worms • Definition, main characteristics • Differences from Viruses • Bandwidth consumption and speed of propagation • DOS attack

  3. Code Red I • History of first Worm • Vulnerability : IIS • Payload or Damage • Nature of access • Propagation

  4. Speed of Propagation • Challenge of accessing a large number of computers based on their IP addresses • Searching all computers for those that have the exposed vulnerability

  5. Code Red II • Differences or enhancements in comparison with Code Red I: vulnerability, payload, etc. • Nimda as an extension to Code Red II

  6. Worming techniques • How worms search for vulnerabilities ? • How worms find computers that have exposed vulnerabilities ? • SYN packets • Hit list scanning • Methods to prepare initial candidate lists of IP addresses to scan.

  7. Permutation scanning • Permutation: writing a program to scan all possible combinations • Use many computers to optimize scanning and reduce the time to complete scanning the entire IP addresses table. • Topological scanning • Flash worms • Contagion

  8. Peer to Peer networks • P2P system architecture characteristics • Relation with worms • Applications and websites using P2P. • Reasons why P2P are good to spread worms through.

  9. Worms communications • Passive and active worms • Proposing a CCDC: Internet emergency center • Reasons to have CCDC. • Identifying outbreaks.

  10. CCDC-Analyzing new worms. • How experts discover worms ? • How they find ways to counter attack them? • Time challenge ? Find worms quickly before they spread, find ways to treat from worms. • Anticipating new threats • Public involvement

  11. Internet worm • Worm guessing passwords • Methods for good selection of passwords and bad selections of passwords • Iphone worms

More Related