ABSTRACT

This chapter explores some of the trends in computer attacks and presents tips for securing reader systems. To create effective defenses, we need to understand the latest tools and techniques our adversaries are throwing at our networks. Once access is gained to a network, attackers usually attempt to learn about the target environment so they can hone their attacks. Worm developers are learning lessons from the successes of each generation of worms and expanding upon them in subsequent attacks. With this evolutionary loop, we are rapidly approaching an era of super worms. The vast majority of worms encountered so far are based on old, off-the-shelf exploits to attack systems. Because they have used old attacks, a patch has been readily available for administrators to fix their machines quickly after infection or to prevent infection in the first place.