AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Download netbus hack attack1/19/2023 ![]() ![]() These programs are effective for illustrating the rate at which malicious agents can spread, as well as for demonstrating the ease with which they are able to penetrate the organization's network defenses. This paper examines the evolution of malicious agents up to approximately year 2000 by first looking at replication and propagation mechanisms of programs such as the Morris Worm and the Melissa Virus. By combining key features of these agents, attackers are now able to create software that poses a serious threat even to organizations that fortify their network perimeter with firewalls. Historically, an arsenal of such agents consisted of viruses, worms, and trojanized programs. In the context of this paper, a malicious agent is a computer program that operates on behalf of a potential intruder to aid in attacking a system or network. (You can also download the PDF version of this paper, as well as the accompanying PowerPoint deck and the article's translation into Portuguese.) ![]() This article, written in 2000, examines the evolution of malicious agents by analyzing features and limitations of popular viruses, worms, and trojans, detailing the possibility of a new breed of malicious agents that appeared at that time. ![]()
0 Comments
Read More
Leave a Reply. |