ST Microsystems / Eeye / Lawrence Berkeley National Laboratory / Xilinx / Microsoft / been confirmed attacking LBNL / / /
Event
Extinction / Natural Disaster / /
Facility
harbor Nimda / Lawrence Berkeley National Laboratory / Your Spare Time Stuart Staniford∗ Silicon Defense Vern Paxson† ICSI Center / University of California / /
IndustryTerm
internal networks / use Web-crawling techniques / Internet-connected servers / Internet Worm / overall Internet infection rate graph / Internet-scale worms / given site / intrusion detection systems / coordination infrastructure / valid web servers / Web server worms / worm attacking web servers / law enforcement attention / finite systems / e-commerce sites / web servers / infection site / Internet Research Nicholas Weaver / particular site / even poor Internet connections / peer-topeer networks / Internet hosts / Web attacks / Internet worms / vulnerable software / Internet address space / permutation scanning algorithm / web server / vulnerable services / protection technologies / Internet scale hit-lists / deployed services / web probes / vulnerable systems / internal network / /
OperatingSystem
Windows 2000 server / Windows NT / Microsoft Windows 2000 / /
Organization
Chemical Abstracts Service / Center for Disease Control / UC Berkeley / University of California / Berkeley / U.S. Securities and Exchange Commission / Your Spare Time Stuart Staniford∗ Silicon Defense Vern Paxson† ICSI Center / /
Person
Code Red II / Ken Eichmann / Marc Maiffret / Ryan Permeh / Nicholas Weaver / /
Position
worm author / Governor / /
Product
Windows 2000 / /
ProvinceOrState
Manitoba / California / /
PublishedMedium
the Chemical Abstracts Service / /
Region
Central US / /
Technology
block cipher / permutation scanning algorithm / DNS / firewall / protection technologies / HTTP / simulation / flash / web server / /