Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
How to 0wn the Internet in Your Spare Time Stuart Staniford
 

Summary: How to 0wn the Internet in Your Spare Time
Stuart Staniford
Vern Paxson
Nicholas Weaver
Silicon Defense ICSI Center for Internet Research UC Berkeley
stuart@silicondefense.com vern@icir.org nweaver@cs.berkeley.edu
Abstract
The ability of attackers to rapidly gain control of vast
numbers of Internet hosts poses an immense risk to the
overall security of the Internet. Once subverted, these
hosts can not only be used to launch massive denial of
service floods, but also to steal or corrupt great quantities
of sensitive information, and confuse and disrupt use of
the network in more subtle ways.
We present an analysis of the magnitude of the threat.
We begin with a mathematical model derived from em-
pirical data of the spread of Code Red I in July, 2001. We
discuss techniques subsequently employed for achiev-
ing greater virulence by Code Red II and Nimda. In this
context, we develop and evaluate several new, highly vir-

  

Source: Akella, Aditya - Department of Computer Sciences, University of Wisconsin at Madison
Paxson, Vern - ICIR, ICSI Center for Internet Research
Perrig, Adrian - Department of Electrical and Computer Engineering, Carnegie Mellon University

 

Collections: Computer Technologies and Information Sciences