- 7
- 0
- 约8.83万字
- 约 36页
- 2017-07-02 发布于湖北
- 举报
Chapter10概要1
Worms first appeared on mobile phones in 2004. These worms communicate through Bluetooth wireless connections or via the multimedia messaging service (MMS). The target is the smartphone, which is a mobile phone that permits users to install software applications from sources other than the cellular network operator. Mobile phone malware can completely disable the phone, delete data on the phone, or force the device to send costly messages to premium- priced numbers. An example of a mobile phone worm is CommWarrior, which was launched in 2005. This worm replicates by means of Bluetooth to other phones in the receiving area. It also sends itself as an MMS file to numbers in the phones address book and in automatic replies to incoming text messages and MMS messages. In addition, it copies itself to the removable memory card and inserts itself into the program installation files on the phone. * * There is considerable overlap in techniques for dealing with viruses and worms. Once a worm is resident on a machine, antivirus software can be used to detect it. In addition, because worms propagation generates considerable network activity, the monitoring of that activity can lead form the basis of a worm defense. Have classes: Signature-based worm scan filtering: generates a worm signature, which is then used to prevent worm scans from entering/leaving a network/host. Filter-based worm containment: focuses on worm content rather than a scan signature. The filter checks a message to determine if it contains worm code. Payload-classification-based worm containment: examine packets to see if they contain a worm using anomaly detection techniques Threshold random walk (TRW) scan detection: exploits randomness in picking destinations to connect to as a way of detecting if a scanner is in operation Rate limiting: limits the rate of scanlike traffic from an infected host. Rate halting: immediately blocks outgoing traffic when a threshold is exceeded either in outgoing connec
您可能关注的文档
- Chapter 6 pragmatics 语言学整理的资料概要1.doc
- Chapter 6 Pragmatics概要1.doc
- Chapter 6 Price国际贸易实务概要1.ppt
- Chapter 5 元音单元音概要1.ppt
- chapter 6 Numerals概要1.ppt
- Chapter 6 Collection概要1.ppt
- chapter 6 terms of payment概要1.ppt
- Chapter 6 对对概要1.ppt
- chapter 6《现代物流专业英语》易牧农电子教案3846概要1.ppt
- Chapter 6 Semantics概要1.ppt
- chapter 3跨文化课件概要1.ppt
- Chapter11 FIELD EQUATIONS AND BOUNDARY CONDITIONS IN FLUID MECHANICS.ppt东鹏已改cyt已改概要1.pptx
- chapter10 Investment, Net Exports, and Interest Rates(宏观经济学加州大学詹姆斯·布拉德福特·德隆)概要1.ppt
- chapter11(多元线性)概要1.ppt
- Chapter13 Overall Audit Planand Audit Program(审计学英文版)概要1.ppt
- Chapter15 Audit Sampling for Tests of Controls and (审计学英文版)概要1.ppt
- Chapter16 Usinging the computer用电脑概要1.ppt
- chapter15 International Economic Policy(宏观经济学加州大学詹姆斯·布拉德福特·德隆)概要1.ppt
- chapter2 各类化合物的制备方法概要1.ppt
- chapter22概要1.ppt
原创力文档

文档评论(0)