Overview
Syllabus
Intro
Disclaimer
Overview
Worms Defined
Worms in History
Why Worms?
Two Futures
Six Components of Worms
Reconnaissance
Specific Attacks
Command Interface
Intelligence Database
Unused and Non-attack Capabilities
Assembled Pieces
Current Limitations
Limited Capabilities: Recon
Limited Capabilities: Attack
Traffic Growth Rates
Traffic Growth Patterns
Network Structure
Network Topology
Limitations of Directionality
Limitations Conclusions
Future Considerations
Dynamic Behavior
Dynamic Network Roles
Updates to the Nodes
Embedding Messages
Stealth Broadcasts
Signed Updates
Communications Topology
Worm Detection
Worm Signatures
New Challenges
Defenses
Acknowledgements
Taught by
Black Hat