• DocumentCode
    990487
  • Title

    Controlled Chaos [Internet Security]

  • Author

    Nucci, Antonio ; Bannerman, Steve

  • Author_Institution
    Narus, Inc., Mountain View, CA, USA
  • Volume
    44
  • Issue
    12
  • fYear
    2007
  • Firstpage
    42
  • Lastpage
    48
  • Abstract
    We need to exploit the science of order and disorder to protect networks against coming generations of superworms. Internet security professionals are, by occupational temperament, a pretty nervous bunch. But lately they´ve had more reason than ever to be jumpy. Early this year, a new kind of worm, known as Storm, began to sweep through the Internet. It hasn´t received much attention in the mainstream press, but it has given security professionals more than a few sleepless nights. Storm is far more sophisticated than previous worms, because it uses peer-to-peer technologies and other novel techniques to evade detection and to spread. The popular press hasn´t paid much attention to Storm, because it has yet to wreak devastating havoc on businesses, as some previous worms have. But we shouldn´t be fooled by that relative quiet: Storm´s designers appear to be biding their time, building an attack network far more disruptive than any before seen.
  • Keywords
    Internet; invasive software; peer-to-peer computing; telecommunication security; Internet security; Storm worm; network attack; network protection; peer-to-peer technology; Buildings; Chaos; Internet; Peer to peer computing; Protection; Security; Storms;
  • fLanguage
    English
  • Journal_Title
    Spectrum, IEEE
  • Publisher
    ieee
  • ISSN
    0018-9235
  • Type

    jour

  • DOI
    10.1109/MSPEC.2007.4390022
  • Filename
    4390022