What is Code Red Worm?
ثبت نشده
چکیده
Code Red worm can be viewed as a new generation of Internet worm that took the Internet and security community by surprise. Now there exist a few versions of Code Red worm and each new version proofs to be more malicious then the original Code Red worm. This should serve as a strong motivation for businesses and corporations alike to beef up their system's defense. Prevention is much more cost effective than cure, especially for mission critical systems. A flexible, defense-in-depth strategy that allows adaptation to t...
منابع مشابه
The Mechanisms and Effects of the Code Red Worm
This paper addresses the vulnerability that was present in Microsoft Internet Information Services (IIS) web server software and the worm, Code Red, which exploited this vulnerability. It describes the mechanisms of three different versions of Code Red, as well as the patches and methods for stopping the worm. Finally, it discusses the effects of the worm, both financially and technically, as w...
متن کاملIntegrating – VPN and IDS – An approach to Networks Security
The Internet and recent global cyber terrorism have fundamentally changed the way organizations approach security. Recent worm and virus incidents such as Code Red, Nimda, and the Slammer worm have heightened security awareness. Also, numerous other threats have emerged recently that are particularly troublesome. Hence some solution must be provided to encounter the new generation of complex th...
متن کاملGAO-01-1073T Information Security: Code Red, Code Red II, and SirCam Attacks Highlight Need for Proactive Measures
متن کامل
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL Slammer worm. Since various worms quickly spread over the Internet using self-propagation mechanism, it is crucial to detect worm propagation and protect them for secure network infrastructure. In this paper, we prop...
متن کاملCode Red: A New Threat
The Code Red worms provided another example of a known security hole being widely exploited after fixes to the vulnerability had been made available. For many unknown reasons, available patches were not applied to vulnerable systems. This allowed the worm to propagate more than a month after fixes to this vulnerability were made publicly available. However, people and organizations can minimize...
متن کامل