The Future of Internet Worms
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the future of internet worms in this 49-minute Black Hat USA 2001 conference talk by Jose Nazario. Delve into the definition, history, and motivations behind worms, examining two potential futures and six key components. Analyze current limitations in reconnaissance, attack capabilities, traffic growth rates, and network structures. Investigate future considerations including dynamic behavior, network roles, node updates, embedded messages, stealth broadcasts, signed updates, and communication topologies. Learn about worm detection techniques, signatures, new challenges, and potential defenses in this comprehensive overview of evolving cyber threats.
Syllabus
Intro
Disclaimer
Overview
Worms Defined
Worms in History
Why Worms?
Two Futures
Six Components of Worms
Reconnaissance
Specific Attacks
Command Interface
Intelligence Database
Unused and Non-attack Capabilities
Assembled Pieces
Current Limitations
Limited Capabilities: Recon
Limited Capabilities: Attack
Traffic Growth Rates
Traffic Growth Patterns
Network Structure
Network Topology
Limitations of Directionality
Limitations Conclusions
Future Considerations
Dynamic Behavior
Dynamic Network Roles
Updates to the Nodes
Embedding Messages
Stealth Broadcasts
Signed Updates
Communications Topology
Worm Detection
Worm Signatures
New Challenges
Defenses
Acknowledgements
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network