Back to Results
First PageMeta Content
Computer worms / Internet protocols / Netflow / Traffic flow / Blaster / Trivial File Transfer Protocol / Transmission Control Protocol / SQL Slammer / Internet protocol suite / System software / Computing / Software


Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone
Add to Reading List

Document Date: 2005-07-15 07:43:36


Open Document

File Size: 332,48 KB

Share Result on Facebook

Company

IBM / Arbor Networks / Trend Micro / Delirium Research Group / Networks Laboratory / Symantec / Microsoft / Cisco / /

/

Event

Force Majeure / /

Facility

Swiss Federal Institute of Technology / University of St. Gallen HSG etc / University of Geneva / source/destination port / University of California / University of Zurich / /

IndustryTerm

Internet Service Providers / honeypot network / Internet traffic / software vendors / data processing / Internet traffic activity / intrusion detection systems / installed software / slower processing powers / recent Internet / backbone border routers / “Network / border router / greedy spreading algorithm / real-time network monitoring / real-time statistics data / Internet Backbone Thomas D¨ubendorfer / border routers / /

OperatingSystem

Windows XP / Windows 2000 / Microsoft Windows / Windows NT 4.0 / Microsoft Windows 2000 / /

Organization

University of Zurich / Swiss Federal Institute of Technology / University of St. Gallen HSG / University of Geneva / Cooperative Association for Internet Data Analysis / Swiss National Science Foundation / Internet Storm Center / University of California / San Diego / /

Person

Bernhard Plattner / Arno Wagner / /

/

Product

Blaster / Windows 2000 / /

ProgrammingLanguage

D / /

ProvinceOrState

California / /

Technology

LAN / border router / firewall / far too greedy spreading algorithm / IPv4 / operating system / UDP / border routers / operating systems / anti-virus software / WAN / TCP/IP / backbone border routers / /

URL

http /

SocialTag