Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
February 2004

The 'antiworm' evolution: Can it help Internet worm protection?

In the security world, we throw buzzwords around like candy at a Halloween party. Anytime a catch phrase gets traction, it seems that every vendor makes a pitch that its product is "unique" or "first" in the new category. It would be easy to simply write off these categories -- except that sometimes vendors actually have a new solution. Enter "antiworm" or "worm containment" solutions. They promise new prevention and detection techniques that reduce or eliminate propagating worms and protect networks by weeding out bad traffic. The first set of solutions is based on anomaly detection, which identifies malicious code based on deviations from known, acceptable traffic patterns. Solutions from Mazu Networks, Arbor Networks, Lancope and Q1 Labs can quickly identify anomalous activity because most worms will spew out traffic and attempt to connect to other hosts. These solutions don't rely upon static signatures or rules, but will kick off an alarm when they see a traffic spike. Next are those solutions that automatically isolate ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • SOX section 404: Improving security with executive communications

    by  Edward Hurley

    It's widely held that the Sarbanes-Oxley Act will be the two-by-four that gets upper management to pay serious attention to infosecurity. Here you will learn how SOX section 404 plays a hand in improving seucrity with executive communications.

  • Best practices for security report writing

    by  Robert Garigue and Marc Stefaniu

    Concise, targeted security reports command the attention of the executives who need to act on them. Learn best practices for security report writing.

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close