Search worms

@inproceedings{Provos2006SearchW,
  title={Search worms},
  author={Niels Provos and Joe McClain and Ke Wang},
  booktitle={WORM},
  year={2006}
}
Worms are becoming more virulent at the same time as operating system improvements try to contain them.Recent research demonstrates several effective methods to detect and prevent randomly scanning worms from spreading [2, 13]. As a result, worm authors are looking for new ways to acquire vulnerable targets without relying on randomly scanning for them. It is often possible to find vulnerable web servers by sending carefully crafted queries to search engines. Search worms1 automate this… CONTINUE READING
Highly Cited
This paper has 30 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 20 extracted citations

SBotMiner: large scale search bot detection

View 7 Excerpts
Highly Influenced

Searching the Searchers with SearchAudit

View 4 Excerpts
Highly Influenced

EvilSeed: A Guided Approach to Finding Malicious Web Pages

2012 IEEE Symposium on Security and Privacy • 2012
View 4 Excerpts
Highly Influenced

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis

2018 APWG Symposium on Electronic Crime Research (eCrime) • 2018
View 1 Excerpt

Quantification of Attackers Activities on Servers Running Web 2.0 Applications

2010 Ninth IEEE International Symposium on Network Computing and Applications • 2010
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-2 of 2 references

Polygraph: automatically generating signatures for polymorphic worms

2005 IEEE Symposium on Security and Privacy (S&P'05) • 2005
View 7 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…