Home

Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction

Spiros Antonatos; Michael E. Locasto; Stelios Sidiroglou; Angelos D. Keromytis; Evangelos Markatos

Title:
Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction
Author(s):
Antonatos, Spiros
Locasto, Michael E.
Sidiroglou, Stelios
Keromytis, Angelos D.
Markatos, Evangelos
Date:
Type:
Articles
Department:
Computer Science
Permanent URL:
Part Number:
30
Book/Journal Title:
Proceedings of the 3rd European Conference on Computer Network Defense
Book Author:
Siris, Vasilios
Publisher:
Springer
Publisher Location:
New York
Abstract:
Over the past few years we have seen the use of Internet worms, i.e., malicious self-replicating programs, as a mechanism to rapidly invade and compromise large numbers of remote computers [33]. Although the first worms released on the Internet were large-scale, easy-to-spot massive security incidents [6, 19, 20, 26], also known as flash worms [32], it is currently envisioned (and we see already see signs, in the wild) that future worms will be increasingly difficult to detect, and will be known as stealth worms. This may be partly because the motives of early worm developers are thought to have been centered around self-gratification brought by the achievement of compromising large numbers of remote computers, while the motives of recent worm and malware developers have progressed to more mundane (and sinister) financial and political gains.
Subject(s):
Computer science
Publisher DOI:
http://dx.doi.org/10.1007/978-0-387-85555-4_9
Item views:
64
Metadata:
text | xml

In Partnership with the Center for Digital Research and Scholarship at Columbia University Libraries/Information Services | Terms of Use