The Future of Internet Worms

The Future of Internet Worms

Black Hat via YouTube Direct link

Limitations Conclusions

23 of 36

23 of 36

Limitations Conclusions

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Future of Internet Worms

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Disclaimer
  3. 3 Overview
  4. 4 Worms Defined
  5. 5 Worms in History
  6. 6 Why Worms?
  7. 7 Two Futures
  8. 8 Six Components of Worms
  9. 9 Reconnaissance
  10. 10 Specific Attacks
  11. 11 Command Interface
  12. 12 Intelligence Database
  13. 13 Unused and Non-attack Capabilities
  14. 14 Assembled Pieces
  15. 15 Current Limitations
  16. 16 Limited Capabilities: Recon
  17. 17 Limited Capabilities: Attack
  18. 18 Traffic Growth Rates
  19. 19 Traffic Growth Patterns
  20. 20 Network Structure
  21. 21 Network Topology
  22. 22 Limitations of Directionality
  23. 23 Limitations Conclusions
  24. 24 Future Considerations
  25. 25 Dynamic Behavior
  26. 26 Dynamic Network Roles
  27. 27 Updates to the Nodes
  28. 28 Embedding Messages
  29. 29 Stealth Broadcasts
  30. 30 Signed Updates
  31. 31 Communications Topology
  32. 32 Worm Detection
  33. 33 Worm Signatures
  34. 34 New Challenges
  35. 35 Defenses
  36. 36 Acknowledgements

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.