UpComing Seminars

Recent Seminars

Seminar Archive

Ms Elizabeth Styron
Colliding Fronts: Using XML and the TEI to build a full Text Digital Library at the New Zealand Electronic Text Centre

Mr Te Taka Keegan
Reo Maori kei te Ipurangi 2002 - Findings of a recent Maori Language Web Survey

Dr Andy Cockburn
Spatial Memory in 2D and 3D Pysical and Virtual Environments

Dr Alistair Knott
Grounding Linguistic Structure in a model of Sensorimotor Cognition

Professor Ian Witten
Greenstone in Practice

Mr Shaochun Wang
Formal Object-oriented Specification in Standard Z

Mr Greg Reeve
Complete Refinement Rules for Microcharts

Mr Andreas Ribbrock
Groups Acting on Sets - A Powerful Approach to Content Based Retrieval

Mr Matthew Luckie
Measurement and Analysis of One-Way Internet Packet Dynamics

Mrs Beryl Plimmer
FreeFrom: An Interface Design Environment for Novice Programmers

Dr Steve Reeves
Results on Formal Stepwise Design in Z

Dr Steve Reeves
mChart-Based Specification and Refinement

Dr Tyrone Grandison
Trust Management : The SULTAN Perspective

Dr Timothy A Budd
Multiparadigm Programming in J/MP

Dr Matt Jones
Sorting out Searching on Small Screen Devices

Mr John McPherson
Forming a corpus of voice queries for music information retrieval

Professor John Cleary
Optimising Tabling Structures for Bottom-Up Logic Programming

Mr Jarred Potter
Mercy Corps

Professor Nobuo Saito
Cyber Education Across Several Countries

Dr Richard Nelson
Improving Mobile IP Handovers

Dr Tony Smith
The Application of Unstructured Learning Techniques to Bioinformatics and Conceptual Biology

Dr Stefan Kramer
Inductive Databases for Bioinformatics and Predictive Toxicology

Dr Richard Dearden
AI on Mars: Autonomy for Planetary Rovers

Ms Colleen Shannon
Code Red: Spread and Victims of an Internet Worm

Mr David Moore
Fundamental Limits on Blocking Self Propagating Code

Dr Yong Wang
Modeling for Optimal Probability Prediction

Professor Raymond J Mooney
Text Mining with Information Extraction

TSG (Linux)
SCMS Unix Infrastructure

Mr Cameron Esslemont
A Sustainable Infrastructure in Support of Digital Libraries for Remote Communities

Geoff Holmes and Mark Utting
Waikato Visits China

Professor John Cleary
Starlog Group Research Talk: Optimization and Compliation of Data Structures

Dr David Streader
Symbolic model simplification

Ms Anette Steel
The Use of Auditory Feedback in Call Centre CHHI

Mr Thomas Olsson
Information management and software engineering research at Lund University

Dr Larry Spitz
Applications of Character Shape Coding

Dr Balachander Krishnamurthy
Web and Internet Measurement Research

Dr Steve Jones
Interactive Document Summarisation Using Automatically Extracted Keyphrases

Seminar Archive >> 2002
Ms Colleen Shannon - Code Red: Spread and Victims of an Internet Worm

Cooperative Association for Internet Data Analysis


Computer Science Seminar Room, G1.15

On July 19, 2001 more than 359,000 computers were infected with the Code-Red (CRv2) worm in less than 14 hours. The cost of this epidemic, including subsequent strains of Code-Red, is estimated to be in excess of $2.6 billion USD. Despite the global damage caused by this attack, there have been few serious attempts to characterize the spread of the worm. To this end, we collected and analyzed data from a /8 network over a period of 45 days beginning July 2nd, 2001 to determine the characteristics of the spread of Code-Red. We begin our analysis with a look at the initial spread of Code-Red. We examine in detail the infection rate of the worm and its fit to an analytic model of worm spread. To understand the rate at which infected machines were repaired, we measured the patch rate of compromised machines during the subsequent month. We then take an in-depth look at the victims of the Code-Red worm by analyzing the properties of infected hosts, including geographic locations and diurnal patterns of infection. We also quantified the effects of DHCP on measurements of infected hosts and determined that IP address counts are not an accurate measure of the spread of a worm on timescales longer than 24 hours. Although most media coverage focused on large corporations, the Code-Red worm preyed upon home and small business users. Bio: Colleen Shannon is a staff researcher at the Cooperative Association for Internet Data Analysis (CAIDA). Her research interests include traffic measurement, characterization, and modeling, particularly with regard to network security and network application identification.

  2007 FCMS. The University of Waikato - Te Whare Wananga o Waikato