This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Trojan horse hidden part of some otherwise useful software today often in Web page (Active-X, plugin) virus infection by receiving object (e.g., e-mail attachment), actively executing self-replicating: propagate itself to other hosts, users worm : infection by passively receiving object that gets itself executed self- replicating: propagates to other hosts, users Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data) Introduction 1-71 Bad guys: put malware into hosts via Internet Denial of Service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1. select target 2. break into hosts around the network (see botnet) 3. send packets to target from compromised hosts target Introduction 1-72 Bad guys: attack server, network infrastructure The bad guys can sniff packets Packet sniffing: broadcast media (shared Ethernet, wireless) promiscuous network interface reads/records all packets (e.g., including passwords!) passing bypackets (e....
View Full Document
- Winter '12
- Computer Networks