The Anatomy of a Conficker Worm

Awhile back, I heard an interesting podcast from Security Now with Steve Gibson which I found incredibly interesting. This episode dealt with the Conficker Worm and how it latched onto systems while also discussing what caused the media frenzy. Recently, I did some research for a paper and decided to delve deeper into the worm and how it functioned.

The Anatomy ofDistributed Denial of Service Attack (DDoS)
How Zombies Can Take Down Giants

DDoS attacks have become one of the most feared attacks for online entities. DDoS attacks have the ability to take down some of the most powerful networks. In this paper I explore the different avenues of DDoS attack and discuss a few ways in which DDoS attacks may be prevented


Note: Although a large amount of research goes into each of these papers, it is possible for me to make mistakes. If you read any of these papers and spot any false information, please feel free to contact me and let me know. I will update the paper and give credit for any corrected information.