Skip to main content

Malicious Code

  • Chapter
  • First Online:
  • 2933 Accesses

Abstract

In a mere 16 months, from March 1918 to June 1919, the Influenza Pandemic infected and killed between 20 and 70 million people, worldwide [1]. While the virus infected nearly one-fifth of the world’s population, the fatality rate was a startling 2.5% of the infected victims, implying one new death every 2 s [2]. One might ask, why this digression into epidemiological history? The answer is simply, this is the closest analogy to what we are up against. Our modern computing infrastructure, comprised of personal computers, servers, Internet routers, cell phones, personal digital assistants (PDAs) and a myriad of other devices, are all viable “hosts” for an equivalent “digital” pandemic.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Retrieved from http://www.cdc.gov/od/nvpo/intro8.htm

  2. Retrieved from http://www.fsbassociates.com/fsg/flu.htm

  3. Retrieved from http://www.icir.org/vern/papers/cdc-usenix-sec02/

  4. Retrieved from http://www.caida.org/outreach/papers/2002/codered/codered.pdf

  5. Retrieved from http://enterprisesecurity.symantec.com/article.cfm?articleid=967\&EID=0

    Google Scholar 

  6. Retrieved from http://www.cs.berkeley.edu/nweaver/sapphire/

  7. Retrieved from http://itmanagement.earthweb.com/secu/article.php/1577611

  8. Keizer, G. (2010, February 23). Intel confirms ‘sophisticated’ attacks in January: Denies link to Google-China hacks, which used IE6 zero-day to breach networks and steal information. Computerworld

    Google Scholar 

  9. Retrieved from http://home.apu.edu/jcox/projects/individual/Testing/

  10. Retrieved from http://www.cnn.com/2000/TECH/computing/05/02/new.ddos.tool/

  11. Retrieved from http://www.caida.org/analysis/security/code-red/#crv1

  12. Retrieved from http://www.sans.org/rr/paper.php?id=96

  13. Retrieved from http://www.itsecurity.com/papers/iss4.htm

  14. Retrieved from http://www.cert.org/advisories/CA-2001-26.html

  15. Retrieved from http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html

  16. Retrieved from http://project.honeynet.org/papers/honeynet/

  17. Weaver, N. C. (2001, August 15). Warhol worms: The potential for very fast Internet plagues.

    Google Scholar 

  18. Staniford, S., Paxson, V., & Weaver, N. (2002). How to own the Internet in your spare time. Proceedings of the 11th USENIX Security Symposium

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Boulanger, A., Ghosh, S. (2011). Malicious Code. In: Ghosh, S., Turrini, E. (eds) Cybercrimes: A Multidisciplinary Analysis. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13547-7_3

Download citation

Publish with us

Policies and ethics