The Internet Worm Incident
نویسنده
چکیده
On the cvening of 2 November 1988. someone "inrccLcd" lhe Internet with a worm progrnm. That progrnm exploited flaws in utility progrnms in systems based on BSD-derived versions of UNIX. The flaws allowed lhc program to break into those machines and copy itself. thus infccling those syslems. This program eventually spread to thousands of machines. and disrupted nonnal activities and Inlcrnet connectivity for many days. TIlis paper explains why this program was a wonn (as opposed to a virus). and provides a brief chronology of both the spread and eradication of the program. That is followed by discussion of some specific issues raised by the community's reaction and subsequent discussion of the event. Included are some interesting lessons learned from
منابع مشابه
Worm Detection without Knowledge Base in Industrial Networks
A sophisticated worm, namely Stuxnet, attacked Iran nuclear facilities in 2010. This incident, together with newly found similar worms, e.g., Duqu, Flame, Gauss, highlight the cyber threat in industrial networks. These worms are highlytargeted and are carefully tested before being released. They are difficult to be detected by current security products, as there is no knowledge about them when ...
متن کاملInternet Worm Classification and Detection using Data Mining Techniques
Internet worm means separate malware computer programs that repeated itself and in order to spread one computer to another computer. Malware includes computer viruses, worms, root kits, key loggers, Trojan horse, and dialers, adware, malicious, spyware, rogue security software and other malicious programs. It is programmed by attackers to interrupt computer process, gatherDelicate Information, ...
متن کاملARCE Core Security Technologies
the next big one to surface. With the overwhelming amount of bug reports and security threats made public every day, it is daunting and difficult to identify trends and have a reasonable expectation of adopting a proac-tive information security strategy that deals with possible future threats. The Attack Trends department attempts to examine security bugs and exploitation programs and technique...
متن کاملEfficient STAKCERT KDD Processes in Worm Detection
This paper presents a new STAKCERT KDD processes for worm detection. The enhancement introduced in the data-preprocessing resulted in the formation of a new STAKCERT model for worm detection. In this paper we explained in detail how all the processes involved in the STAKCERT KDD processes are applied within the STAKCERT model for worm detection. Based on the experiment conducted, the STAKCERT m...
متن کاملGLOWS: A High Fidelity Worm Simulator
This work presents our GLOWS (Gateway Level Oregon Worm Simulator) simulator, designed to produce realistic worm traffic over a broad range of scenarios. GLOWS simulates the spread of a worm across the Internet and its propagation into a single domain with the goal of capturing the worm traffic that crosses the gateway point separating the monitored domain from the Internet.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1989