DocumentCode
990487
Title
Controlled Chaos [Internet Security]
Author
Nucci, Antonio ; Bannerman, Steve
Author_Institution
Narus, Inc., Mountain View, CA, USA
Volume
44
Issue
12
fYear
2007
Firstpage
42
Lastpage
48
Abstract
We need to exploit the science of order and disorder to protect networks against coming generations of superworms. Internet security professionals are, by occupational temperament, a pretty nervous bunch. But lately they´ve had more reason than ever to be jumpy. Early this year, a new kind of worm, known as Storm, began to sweep through the Internet. It hasn´t received much attention in the mainstream press, but it has given security professionals more than a few sleepless nights. Storm is far more sophisticated than previous worms, because it uses peer-to-peer technologies and other novel techniques to evade detection and to spread. The popular press hasn´t paid much attention to Storm, because it has yet to wreak devastating havoc on businesses, as some previous worms have. But we shouldn´t be fooled by that relative quiet: Storm´s designers appear to be biding their time, building an attack network far more disruptive than any before seen.
Keywords
Internet; invasive software; peer-to-peer computing; telecommunication security; Internet security; Storm worm; network attack; network protection; peer-to-peer technology; Buildings; Chaos; Internet; Peer to peer computing; Protection; Security; Storms;
fLanguage
English
Journal_Title
Spectrum, IEEE
Publisher
ieee
ISSN
0018-9235
Type
jour
DOI
10.1109/MSPEC.2007.4390022
Filename
4390022
Link To Document