Completed
Limited Capabilities: Attack
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Future of Internet Worms
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Disclaimer
- 3 Overview
- 4 Worms Defined
- 5 Worms in History
- 6 Why Worms?
- 7 Two Futures
- 8 Six Components of Worms
- 9 Reconnaissance
- 10 Specific Attacks
- 11 Command Interface
- 12 Intelligence Database
- 13 Unused and Non-attack Capabilities
- 14 Assembled Pieces
- 15 Current Limitations
- 16 Limited Capabilities: Recon
- 17 Limited Capabilities: Attack
- 18 Traffic Growth Rates
- 19 Traffic Growth Patterns
- 20 Network Structure
- 21 Network Topology
- 22 Limitations of Directionality
- 23 Limitations Conclusions
- 24 Future Considerations
- 25 Dynamic Behavior
- 26 Dynamic Network Roles
- 27 Updates to the Nodes
- 28 Embedding Messages
- 29 Stealth Broadcasts
- 30 Signed Updates
- 31 Communications Topology
- 32 Worm Detection
- 33 Worm Signatures
- 34 New Challenges
- 35 Defenses
- 36 Acknowledgements