First page Back Continue Last page Summary Graphics
A simple computer deception
UDP echo virus
- No deception below protocol level
- Protocol level simulate normal echo function
- Concealed below thresholds of higher levels
Simulation produces built-in protocol response of another echo packet
- Response is itself a UDP echo virus
Notes: