One class of worm defense techniques that received attention of late is to “rate limit ” outbound traffic to contain fast spreading worms. Several proposals of rate limiting techniques have appeared in the literature, each with a different take on the impetus behind rate limiting. This paper presents an empirical analysis on different rate limiting schemes using real traffic and attack traces from a sizable network. In the analysis we isolate and investigate the impact of the critical parameters for each scheme and seek to understand how these parameters might be set in realistic network settings. Analysis shows that using DNS-based rate limiting has substantially lower error rates than schemes based on other traffic statistics. The empiric...
Abstract—We study the efficacy of patching and filtering countermeasures in protecting a network aga...
There has been a constant barrage of worms over the internet during the recent past. Besides threate...
Data-provisioning services can provide high value. Since data can be used and misused in unpredictab...
If we limit the contact rate of worm traffic, can we al-leviate and ultimately contain Internet worm...
Wormable system vulnerabilities continue to be identified and so fast spreading network worms contin...
Wormable system vulnerabilities continue to be identified and so fast spreading network worms contin...
Network worms pose a serious threat to the Internet infrastructure as well as end-users. Various tec...
Internet worm attacks have become increasingly more frequent and have had a major impact on the econ...
This document describes an implementation and the testing of an automatic defense system that uses r...
©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish thi...
Internet security attacks have drawn significant attention due to their enormously adverse impact. T...
Despite the proliferation of detection and containment techniques in the worm defense literature, si...
This document describes an implementation and the testing of an automatic defense system that uses r...
Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms, ...
An Internet worm replicates itself by automatically infecting vulnerable systems and may infect hund...
Abstract—We study the efficacy of patching and filtering countermeasures in protecting a network aga...
There has been a constant barrage of worms over the internet during the recent past. Besides threate...
Data-provisioning services can provide high value. Since data can be used and misused in unpredictab...
If we limit the contact rate of worm traffic, can we al-leviate and ultimately contain Internet worm...
Wormable system vulnerabilities continue to be identified and so fast spreading network worms contin...
Wormable system vulnerabilities continue to be identified and so fast spreading network worms contin...
Network worms pose a serious threat to the Internet infrastructure as well as end-users. Various tec...
Internet worm attacks have become increasingly more frequent and have had a major impact on the econ...
This document describes an implementation and the testing of an automatic defense system that uses r...
©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish thi...
Internet security attacks have drawn significant attention due to their enormously adverse impact. T...
Despite the proliferation of detection and containment techniques in the worm defense literature, si...
This document describes an implementation and the testing of an automatic defense system that uses r...
Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms, ...
An Internet worm replicates itself by automatically infecting vulnerable systems and may infect hund...
Abstract—We study the efficacy of patching and filtering countermeasures in protecting a network aga...
There has been a constant barrage of worms over the internet during the recent past. Besides threate...
Data-provisioning services can provide high value. Since data can be used and misused in unpredictab...