Summary: How to 0wn the Internet in Your Spare Time
Silicon Defense ICSI Center for Internet Research UC Berkeley
firstname.lastname@example.org email@example.com firstname.lastname@example.org
The ability of attackers to rapidly gain control of vast
numbers of Internet hosts poses an immense risk to the
overall security of the Internet. Once subverted, these
hosts can not only be used to launch massive denial of
service floods, but also to steal or corrupt great quantities
of sensitive information, and confuse and disrupt use of
the network in more subtle ways.
We present an analysis of the magnitude of the threat.
We begin with a mathematical model derived from em-
pirical data of the spread of Code Red I in July, 2001. We
discuss techniques subsequently employed for achiev-
ing greater virulence by Code Red II and Nimda. In this
context, we develop and evaluate several new, highly vir-