Vigilante: end-to-end containment of internet worms

@inproceedings{Costa2005VigilanteEC,
  title={Vigilante: end-to-end containment of internet worms},
  author={Manuel Jo{\~a}o Costa and Jon A Crowcroft and Miguel Castro and Antony I. T. Rowstron and Lidong Zhou and Lintao Zhang and Paul Barham},
  booktitle={SOSP},
  year={2005}
}
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work has proposed network-level techniques to automate worm containment; these techniques have limitations because there is no information about the vulnerabilities exploited by worms at the network level. We propose Vigilante, a new end-to-end approach to contain worms automatically that addresses these limitations. Vigilante relies on collaborative worm detection at end hosts, but does not… CONTINUE READING
Highly Influential
This paper has highly influenced 71 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 562 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 394 extracted citations

563 Citations

050100'07'10'13'16
Citations per Year
Semantic Scholar estimates that this publication has 563 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-6 of 6 references

Binary interception of Win32 functions

  • G. Hunt, Brubacher, D. Detours
  • In USENIX Windows NT Symposium (July
  • 1999
Highly Influential
4 Excerpts

Similar Papers

Loading similar papers…