Team for Research in
Ubiquitous Secure Technology

Experiences with Countering Internet Attacks
Vern Paxson

Citation
Vern Paxson. "Experiences with Countering Internet Attacks". Talk or presentation, 6, December, 2006.

Abstract
Since the 1990s Internet attacks have seen a great deal of growth in both sophistication and automation. Today, the severity and pace of innovation of attacks threatens to increase much further, as the perpetrators find ways to commercialize their activities and create economic markets in which to conduct them. This talk draws upon experiences from a decade of conducting network security research in a hands-on operational setting at the Lawrence Berkeley National Laboratory. I will frame the range of real-world constraints that shape the efforts, the deep problem of "evasion", and the successes and challenges of tackling the threat posed by the large-scale compromise of Internet hosts due to automated malware such as worms and botnets.

Electronic downloads

Citation formats  
  • HTML
    Vern Paxson. <a
    href="http://www.truststc.org/pubs/152.html"
    ><i>Experiences with Countering Internet
    Attacks</i></a>, Talk or presentation,  6,
    December, 2006.
  • Plain text
    Vern Paxson. "Experiences with Countering Internet
    Attacks". Talk or presentation,  6, December, 2006.
  • BibTeX
    @presentation{Paxson06_ExperiencesWithCounteringInternetAttacks,
        author = {Vern Paxson},
        title = {Experiences with Countering Internet Attacks},
        day = {6},
        month = {December},
        year = {2006},
        abstract = {Since the 1990s Internet attacks have seen a great
                  deal of growth in both sophistication and
                  automation. Today, the severity and pace of
                  innovation of attacks threatens to increase much
                  further, as the perpetrators find ways to
                  commercialize their activities and create economic
                  markets in which to conduct them. This talk draws
                  upon experiences from a decade of conducting
                  network security research in a hands-on
                  operational setting at the Lawrence Berkeley
                  National Laboratory. I will frame the range of
                  real-world constraints that shape the efforts, the
                  deep problem of "evasion", and the successes and
                  challenges of tackling the threat posed by the
                  large-scale compromise of Internet hosts due to
                  automated malware such as worms and botnets.},
        URL = {http://www.truststc.org/pubs/152.html}
    }
    

Posted by Alvaro Cardenas on 11 Dec 2006.
Groups: trustseminar
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.