SEARCH ENGINEERING RESEARCH PAPERS

slammer worm IEEE PAPER



Inside the slammer worm
free download

ABSTRACT p The Slammer worm, also sometimes known as Sapphire, was the fastest worm in history, achieving a peak scanning rate of 55 million scans per second. This time, this new worm breed had internal programming flaws and a benign payload, but what

A T-entropy analysis of the slammer worm outbreak
free download

Abstract Network events such as Internet worms, port scans, and DDoS attacks pose an ongoing threat to Internet businesses and organizations. The detection of such events is often difficult, especially on nodes that are not immediately involved. In 2002, Kulkarni,

Analysis of the SQL Slammer worm and its effects on Indiana University and related institutions
free download

On November 2nd 1988 Robert Morris, then a Cornell University computer science graduate student, released the first Internet worm. Morris's Worm, as it was known, exploited known flaws in the finger and sendmail services as well as in common webs of trust inherent in

Delegating capabilities in predicate encryption systems
free download

For example, suppose that Carnegie Mellon University has the capability to decrypt all log entries satisfying characteristics of the SQL Slammerworm. Now the university may ask a specific group of re- searchers to study the

The myths and facts behind cyber security risks for industrial control systems
free download

Yet this flies in the face of a number of well documented cyber-related incidents such as the SlammerWorm infiltration of an Ohio Nuclear plant and sev- eral power utilities [4] [5] and the wireless attack on a sewage SCADA system in Queensland Australia [6]. Clearly the

Challenges for securing cyber physical systems
free download

a computer at a water filtering plant in Pennsylvania and used it as its own distribution system for spam and pirated software [9]. Another famous example of these type of attacks occurred in January 2003, when computers infected with the Slammerworm shut down safety

A T-entropy analysis of the slammer worm outbreak
free download

Abstract Network events such as Internet worms, port scans, and DDoS attacks pose an ongoing threat to Internet businesses and organizations. The detection of such events is often difficult, especially on nodes that are not immediately involved. In 2002, Kulkarni,

Profiling and Clustering Internet Hosts.
free download

We next use the created host profiles to detect anomalous behavior during the Slammer worm spread. on edge networks) on January 25-26, 2003, covering the period immediately before and during the outbreak of the Slammerworm.

A worst-case worm
free download

Additionally, based on previous experiences with the Slammerworm disrupting a nuclear power plant's systems , ATMs and 911 operations, and Welchia's disruption of the Navy Marine Corps Intranet , the attack could plausibly affect other critical

Towards A Taxonomy Of Attacks Against Energy Control Systems.
free download

Execute:target. This behavior is typical of a virus or worm (eg, Slammerworm that exploits an MS-SQL vulnerability [20]). Modify:target.

The vulnerability of nuclear facilities to cyber attack
free download

On January 25, 2003, at 12:30 AM Eastern Standard Time, the Slammerworm began exploiting a vulnerability in Microsoft SQL Server. The Slammerworm also infected computer systems at the Davis-Besse nuclear power plant near Oak Harbor, Ohio.

An analysis of BGP update surge during Slammer attack
free download

Page 3. Slammer and BGP Mohit Lad: IWDC 03 Background of SQL SlammerWorm attack 1. Started infecting hosts with known SQL server vulnerability around 5:30 am GMT on Jan 25, 2003 2. Infected machines generated traffic towards seeming random destinations

No clear answers on monoculture issues
free download

The biological analogy simply does not work well. Consider the SQL.Slammerworm that infected only 75,000 of the Internet's 175 million machines. That's less than one- tenth of 1 percent, but the worm's negative consequences were enormous. Just six months ear- lier, the Slammerworm took nearly everyone by surprise, and no one wanted to be caught off guard again. So, in early August, we carefully watched the Internet health indica- tors for any signs of worm activity.

The laws of vulnerabilities
free download

Windows Vulnerabilities in Action: The Outbreak of the SQL SlammerWorm Slammer Vulnerability MS-SQL 8.0 UDP SlammerWorm Buffer Overflow Vulnerability

Worm Traffic Analysis and Characterization.
free download

In 2001 the Code Red I and II worms spread all over the world by exploiting a bug in Microsoft web servers, causing denial of services, systems and network compromise, and links overload, corresponding to several billions damage [2]. In 2003, the Slammerworm, the fastest

An attack model development process for the cyber security of safety related nuclear digital IC systems
free download

[1] Commission on Engineering and Technical Systems (CETS),Digital Instrumentation and Control Systems in Nuclear Power Plants: Safety and Reliability Issues, http://books.nap.edu/ catalog phprecord_id=5432#orgs , Slammerworm crashed Ohio nuke Page 1. Clear Text For the six months prior to the Sapphire (or SQL Slammer) worm's release, the particular vulnerability that Slammer exploited was one of literally hundreds already known. The Slammerworm was the fastest computer worm in history.

An improved worm mitigation model for evaluating the spread of aggressive network worms
free download

REFERENCES [1] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford: SlammerWorm Dissection. Inside the SlammerWorm; Cooperative Association for Internet Data Analysis and University of California, San Diego; Published in IEEE Security Privacy, Vol. 1 No.

Intelligent worms: searching for preys
free download

After the Code Red and Nimda worms were released into the Internet in 2001, the Slammer worm was unleashed with a 376-byte User Datagram Protocol (UDP) packet and infected at least 160,000 computers worldwide on January 25, 2003.

AVOIDIT: A cyber attack taxonomy
free download

B. Taxonomy Example with SQL Slammer SQL Slammerworm was able to perform 55 million scans per second and compromised ninety percent of vulnerable hosts in 10 minutes [3]. Continuing from our example in section 1, if the SQL slammerworm was activated on a

Trends in viruses and worms
free download

Recent virus and worm outbreaks, such as the Blaster worm in August 2003 and the SQL Sapphire/Slammerworm in January 2003, have demonstrated that networked computers continue to be vulnerable to new attacks despite the widespread deployment of antivirus software


FREE ENGINEERING RESEARCH PAPERS