DocumentCode :
990487
Title :
Controlled Chaos [Internet Security]
Author :
Nucci, Antonio ; Bannerman, Steve
Author_Institution :
Narus, Inc., Mountain View, CA, USA
Volume :
44
Issue :
12
fYear :
2007
Firstpage :
42
Lastpage :
48
Abstract :
We need to exploit the science of order and disorder to protect networks against coming generations of superworms. Internet security professionals are, by occupational temperament, a pretty nervous bunch. But lately they´ve had more reason than ever to be jumpy. Early this year, a new kind of worm, known as Storm, began to sweep through the Internet. It hasn´t received much attention in the mainstream press, but it has given security professionals more than a few sleepless nights. Storm is far more sophisticated than previous worms, because it uses peer-to-peer technologies and other novel techniques to evade detection and to spread. The popular press hasn´t paid much attention to Storm, because it has yet to wreak devastating havoc on businesses, as some previous worms have. But we shouldn´t be fooled by that relative quiet: Storm´s designers appear to be biding their time, building an attack network far more disruptive than any before seen.
Keywords :
Internet; invasive software; peer-to-peer computing; telecommunication security; Internet security; Storm worm; network attack; network protection; peer-to-peer technology; Buildings; Chaos; Internet; Peer to peer computing; Protection; Security; Storms;
fLanguage :
English
Journal_Title :
Spectrum, IEEE
Publisher :
ieee
ISSN :
0018-9235
Type :
jour
DOI :
10.1109/MSPEC.2007.4390022
Filename :
4390022
Link To Document :
بازگشت