Главная
Study mode:
on
1
Intro
2
Disclaimer
3
Overview
4
Worms Defined
5
Worms in History
6
Why Worms?
7
Two Futures
8
Six Components of Worms
9
Reconnaissance
10
Specific Attacks
11
Command Interface
12
Intelligence Database
13
Unused and Non-attack Capabilities
14
Assembled Pieces
15
Current Limitations
16
Limited Capabilities: Recon
17
Limited Capabilities: Attack
18
Traffic Growth Rates
19
Traffic Growth Patterns
20
Network Structure
21
Network Topology
22
Limitations of Directionality
23
Limitations Conclusions
24
Future Considerations
25
Dynamic Behavior
26
Dynamic Network Roles
27
Updates to the Nodes
28
Embedding Messages
29
Stealth Broadcasts
30
Signed Updates
31
Communications Topology
32
Worm Detection
33
Worm Signatures
34
New Challenges
35
Defenses
36
Acknowledgements
Description:
Explore the future of internet worms in this 49-minute Black Hat USA 2001 conference talk by Jose Nazario. Delve into the definition, history, and motivations behind worms, examining two potential futures and six key components. Analyze current limitations in reconnaissance, attack capabilities, traffic growth rates, and network structures. Investigate future considerations including dynamic behavior, network roles, node updates, embedded messages, stealth broadcasts, signed updates, and communication topologies. Learn about worm detection techniques, signatures, new challenges, and potential defenses in this comprehensive overview of evolving cyber threats.

The Future of Internet Worms

Black Hat
Add to list
0:00 / 0:00