kendra
Uploaded by
11 SLIDES
253 VUES
110LIKES

Understanding Biological and Computer Worms: Characteristics, Propagation, and Impact

DESCRIPTION

This chapter delves into the definitions, characteristics, and differences between biological and computer worms. Key concepts such as propagation speed, bandwidth consumption, and the historical context of prominent worms like Code Red I and II are explored. The evolution of worm techniques, including methods for scanning vulnerabilities and the role of peer-to-peer networks, is discussed. The text also emphasizes the importance of early detection through initiatives like the CCDC (Computer Crisis Detection Center) and the need for public awareness in combating emerging threats like iPhone worms.

1 / 11

Télécharger la présentation

Understanding Biological and Computer Worms: Characteristics, Propagation, and Impact

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CIS 442- Chapter 3 Worms

  2. Worms • Biological and computer worms • Definition, main characteristics • Differences from Viruses • Bandwidth consumption and speed of propagation • DOS attack

  3. Code Red I • History of first Worm • Vulnerability : IIS • Payload or Damage • Nature of access • Propagation

  4. Speed of Propagation • Challenge of accessing a large number of computers based on their IP addresses • Searching all computers for those that have the exposed vulnerability

  5. Code Red II • Differences or enhancements in comparison with Code Red I: vulnerability, payload, etc. • Nimda as an extension to Code Red II

  6. Worming techniques • How worms search for vulnerabilities ? • How worms find computers that have exposed vulnerabilities ? • SYN packets • Hit list scanning • Methods to prepare initial candidate lists of IP addresses to scan.

  7. Permutation scanning • Permutation: writing a program to scan all possible combinations • Use many computers to optimize scanning and reduce the time to complete scanning the entire IP addresses table. • Topological scanning • Flash worms • Contagion

  8. Peer to Peer networks • P2P system architecture characteristics • Relation with worms • Applications and websites using P2P. • Reasons why P2P are good to spread worms through.

  9. Worms communications • Passive and active worms • Proposing a CCDC: Internet emergency center • Reasons to have CCDC. • Identifying outbreaks.

  10. CCDC-Analyzing new worms. • How experts discover worms ? • How they find ways to counter attack them? • Time challenge ? Find worms quickly before they spread, find ways to treat from worms. • Anticipating new threats • Public involvement

  11. Internet worm • Worm guessing passwords • Methods for good selection of passwords and bad selections of passwords • Iphone worms

More Related
SlideServe
Audio
Live Player
Audio Wave
Play slide audio to activate visualizer