[ main >> docbox >> PCAP Archives ]
[ Japanese | English ]

	
   Table of Contents[top]

   List of PCAP Archives[top]
Name Retrieval Behavior
till 200 seconds
Retrieval Behavior
till about 50,000 packets or reboot
PCAP
Blaster Retrieval Behavior of Blaster till 200 secs Retrieval Behavior of Blaster Summary
Download
Codered3 Retrieval Behavior of Codered3 till 200 secs Retrieval Behavior of Codered3 Summary
Download
DoomjuiceA Retrieval Behavior of DoomjuiceA till 200 secs Retrieval Behavior of DoomjuiceA Summary
Download
DoomjuiceB Retrieval Behavior of DoomjuiceB till 200 secs Retrieval Behavior of DoomjuiceB Summary
Download
NimdaE Retrieval Behavior of NimdaE till 200 secs Retrieval Behavior of NimdaE Summary
Download
SasserB Retrieval Behavior of SasserB till 200 secs Retrieval Behavior of SasserB Summary
Download
SasserC Retrieval Behavior of SasserC till 200 secs Retrieval Behavior of SasserC Summary
Download
Slammer Retrieval Behavior of Slammer till 200 secs Retrieval Behavior of Slammer Summary
Download
ZotobE Retrieval Behavior of ZotobE till 200 secs Retrieval Behavior of ZotobE Summary
Download
ZotobH Retrieval Behavior of ZotobH till 200 secs Retrieval Behavior of ZotobH Summary
Download
http://www.first.org/resources/papers/conf2005.html#p107
http://www.first.org/conference/2005/papers/masato-terada-paper-1.pdf
http://www.first.org/conference/2005/papers/masato-terada-slides-1.pdf
Proposal for the experimental environment for Network Worm infection
17th Annual FIRST Conference (June 26 - July 1, 2005)
 
Code analysis and simulation of network worm infection are useful methods to evaluate how it spreads and its effects. But a bug in infection algorithm or the way of implementing a random number generator etc. affects the retrieval behavior of network worm infection. It is important to evaluate the retrieval behavior of network worm infection in an experimental environment for complementing code analysis. This paper describes a prototype of experimental environment for network worm infection and actual data about network worm infection. The purpose of experimental environment is to investigate retrieval behavior and infection mechanisms in network worm behavior. For example, there are a mapping of retrieved IP addresses and a ratio of IP addresses retrieved and port numbers used by network worms. Also we implemented a prototype system to show the validity of our approach.

   Revisions[top]
  • Published.: 2007-08-13T13:25+00:00


	

Last updated: 2007-08-13T13:25+00:00
Valid HTML 4.01! Valid CSS!