Chapter1_2_Part_6

Chapter1_2_Part_6 - Trojan horse hidden part of some...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Trojan horse hidden part of some otherwise useful software today often in Web page (Active-X, plugin) virus infection by receiving object (e.g., e-mail attachment), actively executing self-replicating: propagate itself to other hosts, users worm : infection by passively receiving object that gets itself executed self- replicating: propagates to other hosts, users Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data) Introduction 1-71 Bad guys: put malware into hosts via Internet Denial of Service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1. select target 2. break into hosts around the network (see botnet) 3. send packets to target from compromised hosts target Introduction 1-72 Bad guys: attack server, network infrastructure The bad guys can sniff packets Packet sniffing: broadcast media (shared Ethernet, wireless) promiscuous network interface reads/records all packets (e.g., including passwords!) passing bypackets (e....
View Full Document

Page1 / 6

Chapter1_2_Part_6 - Trojan horse hidden part of some...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online