Skip to Content
Malware: Fighting Malicious Code
book

Malware: Fighting Malicious Code

by Ed Skoudis, Lenny Zeltser
November 2003
Beginner to intermediate content levelBeginner to intermediate
672 pages
18h 40m
English
Pearson
Content preview from Malware: Fighting Malicious Code

Bigger Isn't Always Better: The Un-Superworm

There is one problem with the superworm capabilities we discussed in the last section. With all of these bells and whistles, superworms could very likely become bloatware. This term is applied to software that is just too big and complex for the task it needs to accomplish. A worm with all of the superworm features would likely be very complicated and large. Superworms' complexity could lead to system crashes, and their size might get them detected even if they attempt to implement stealth through polymorphism. If I see large numbers of one-megabyte files transferring themselves into my network, I'm going to take notice, even if they happen to be polymorphic and metamorphic.

So, although the general ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Jon Edney, William A. Arbaugh
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

Michael Hale Ligh, Steven Adair, Blake Hartstein, Matthew Richard
Enterprise Java™ Security: Building Secure J2EE™ Applications

Enterprise Java™ Security: Building Secure J2EE™ Applications

Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin

Publisher Resources

ISBN: 0131014056Purchase book