| Document Date: 2004-11-02 14:39:42 Open Document File Size: 245,73 KBShare Result on Facebook
City CR / An IDS / Washington / DC / / Company Intrusion Detection Systems / eEye / Computer-Communication Networks / MSBlaster / Symantec Corp. / Microsoft Corporation / IBM / McAfee Network Security Technologies Group / ACM Press / / Country United States / / Currency USD / / / Facility TCP port / Computer Science† North Carolina State University / UDP port / using TCP / / IndustryTerm well known site / Anti-virus software / real Internet / suspicious systems / opcode search.html / patch-management systems / vulnerable server / patch management infrastructure / worm propagation algorithms / re-generation algorithm / target network / invasive software / web.lemuria.org/ security/ / network management tools / automated strike-back technology / virtual network / patch management tools / web server / download site / trial-anderror search algorithm / Internet community / detection systems / network communications / overall network / software vendors / Internet worm / Internet quarantine / proposed Internet CDC / transformation algorithms / Internet ecology / software vendor level / heuristic based algorithm / search algorithm / proposed Internet-scale antiworm / Internet Center / search algorithms / remote server / computer systems / software updating / anti-worm generation algorithm / Internet counterpart / online hosts / Automatic patching systems / corporate network / prototype anti-worm generation algorithm / payload search algorithm / sequential search / network management / hardware technology / internet virus / Internet Information Server / / OperatingSystem VMs / Windows XP / Microsoft Windows / Microsoft Windows 2000 / Linux / DoS / / Organization Center for Disease Control / navy / North Carolina State University / United States Marine Corps / / Person D. Moore / V / S. Staniford / V / Nicholas Weaver / Honey Pot / Jun Xu / / Position General / worm author / / Product Microsoft Corporation Portable Audio Device / Code-Red I / / ProgrammingLanguage XML / Microsoft SQL Server / / PublishedMedium Communications of the ACM / IEEE Spectrum / / Technology Virtual PC / XML / search algorithm / Linux / CMP / transformation algorithms / automated strike-back technology / optimising worm propagation algorithms / Virtual Machine / AV / re-generation algorithm / search algorithms / anti-worm generation algorithm / hardware technology / UDP / Operating Systems / Anti-virus software / prototype anti-worm generation algorithm / payload search algorithm / application protocols / DNS / trial-anderror search algorithm / firewall / heuristic based algorithm / HTTP / IPv4 / simulation / web server / / URL www.securityfocus.com / www.hammerofgod.com / www.rootkit.com / www.cs.berkeley.edu / www.lsd-pl.net / www.theregister.com / www.metasploit.com / www.infoworld.com / www.caida.org / www.eeye.com / www.digitaloffense.net / /
SocialTag |