Back to Results
First PageMeta Content
SQL Slammer / Computer security / Code Red / Witty / Failure / Morris worm / Computer worms / Cyberwarfare / Denial-of-service attacks


Preliminary Results Using Scale-Down to Explore Worm Dynamics Nicholas Weaver∗ Ihab Hamadeh†
Add to Reading List

Document Date: 2004-11-02 14:41:42


Open Document

File Size: 458,25 KB

Share Result on Facebook

City

Washington / DC / /

Company

Cambridge University Press / Infected Systems / /

Currency

USD / /

/

Facility

University of Wisconsin Tarpit Network Slammer's Scanning Rate Per Worm / University of Wisconsin Tarpit Network / University of Wisconsin / /

IndustryTerm

Internet Measurement Workshop / Internet topology / Internet worm / Internet propagation / intrusion detection systems / Internet spread / defense technology / INTERNET SPREAD Slammer / Internet address space / larger defense systems / Internet core / Internet Scanning Rate Millions / model large-scale Internet phenomena / Internet topology model / infectible systems / Internet worm dynamics / model largescale Internet phenomena / vulnerable systems / susceptible systems / Internet-scale events / Internet scanning rate / /

Organization

Cambridge University / University of oregon / National Science Foundation / University of Wisconsin Tarpit Network Slammer / University of Wisconsin / /

Person

N. Weaver / V / Vinod Yegneswaran / S. Staniford / V / Nicholas Weaver∗ Ihab Hamadeh / Colleen Shannon / David Moore / George Kesidis‡ Vern Paxson / Slammer / Abhishek Kumar / Paul Barford / D. Moore / V / /

Position

homogeneous cluster model / heterogeneous cluster model / first model of Slammer / refined model of Internet topology / mathematical model for Code Red / General / second model for Slammer / Homogenious Cluster Model / model / /

ProvinceOrState

Wisconsin / /

Technology

technology of scanning worms / http / simulation / UDP / Cyber defense technology / /

URL

http /

SocialTag