Publication | Closed Access
Sweeper
62
Citations
58
References
2007
Year
Unknown Venue
EngineeringInformation SecurityFastest Hit-list WormsIntrusion ToleranceAnti-virus TechniqueComputer EngineeringDenial-of-service AttackBotnet DetectionComputer ScienceEndless GriefHit-list WormSoftware AnalysisData SecurityCryptography
The vulnerabilities that plague computers cause endless grief to users. Slammer compromised millions of hosts in minutes; a hit-list worm would take under a second. Recently proposed techniques respond better than manual approaches, but require expensive instrumentation, which limits deployment. Although spreading "antibodies" (e.g. signatures) ameliorates this limitation, hosts depending on antibodies are defenseless until inoculation; to the fastest hit-list worms this delay is crucial. Additionally, most recently proposed techniques cannot provide recovery to provide continuous service after an attack.
| Year | Citations | |
|---|---|---|
Page 1
Page 1