Lec 13: Malware II: Network Worms and Botnets Flashcards

1
Q

What are network worms?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do network worms work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the history behnid worms?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the history of the Morris Internet Worm?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does Morris Worm Transmission work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How did Morris Worm Infection work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What did the Morris Worm Stealth/DoS work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the history behind the modern worm era?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the technical enablers for worms?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do we think about worm outbreaks?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two think about when dealing with worm outbreaks and the SI model?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can be done against worm outbreaks?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is software quality prevention?

A
  • against network worms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are wrappers?

A
  • network worm prevention technique
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Software Heterogeneity?

A
  • network worm prevention technique
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is software updating prevention technique?

A
  • network worm prevention
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the known exploit blocking prevention technique?

A
  • network worm prevention
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is hygiene enforcement?

A
  • network worm prevention technique
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is network worm treatment? What are the two issues with it?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are white worms?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is network worm containment? What are the two types of containment?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the requirements for quarantining network worms? How can we define reactive defenses?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What makes worm containment difficult?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Slammer (2003)?

A
  • network worm
25
Was Slammer really fast?
26
Network worm outbreak detection/monitoring. What are the two classes of monitors?
27
What are network telescopes?
28
Why do telescopes work?
29
What is Code Red's Growth vs it's patch rate?
30
What is the global animation of an outbreak?
31
What are the problems with telescopes?
32
What are the overall limitations of telescope, honey net, etc. monitoring?
33
How do you detect worms on your network?
34
What is scan detection?
35
What is signature inference?
36
What is the approach for signature inference?
37
What is content sifting?
38
What does the content sifting algorithm look like in a diagram?
39
What are the challenges to content shifting?
40
What is Earlybird?
41
What is the results of Earlybird?
42
What is UCSD's relationship with content sifting technologies?
43
What are the limitations to content sifting?
44
What are distributed detection issues? What do we do about it?
45
So you've taken over 100,000 machines, now what?
46
What is a botnet?
47
What is the history of botnet?
48
What is the first major motivation of batnets?
49
How do botnets get created?
50
What is architecture of a botnet?
51
What is storm peer-to-peer botnet?
- type of botnet architecture
52
Wha is the Agobot?
53
What are some of the Agobot Commands?
54
How do bots build on one another?
55
How do you detect botnets?
56
How do you disrupt bots?
57
What is command and control disruption?
58
What gets in the way of cleaning bots?