The Internet Worm Incident

نویسنده

  • Eugene H. Spafford
چکیده

On the cvening of 2 November 1988. someone "inrccLcd" lhe Internet with a worm progrnm. That progrnm exploited flaws in utility progrnms in systems based on BSD-derived versions of UNIX. The flaws allowed lhc program to break into those machines and copy itself. thus infccling those syslems. This program eventually spread to thousands of machines. and disrupted nonnal activities and Inlcrnet connectivity for many days. TIlis paper explains why this program was a wonn (as opposed to a virus). and provides a brief chronology of both the spread and eradication of the program. That is followed by discussion of some specific issues raised by the community's reaction and subsequent discussion of the event. Included are some interesting lessons learned from

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Worm Detection without Knowledge Base in Industrial Networks

A sophisticated worm, namely Stuxnet, attacked Iran nuclear facilities in 2010. This incident, together with newly found similar worms, e.g., Duqu, Flame, Gauss, highlight the cyber threat in industrial networks. These worms are highlytargeted and are carefully tested before being released. They are difficult to be detected by current security products, as there is no knowledge about them when ...

متن کامل

Internet Worm Classification and Detection using Data Mining Techniques

Internet worm means separate malware computer programs that repeated itself and in order to spread one computer to another computer. Malware includes computer viruses, worms, root kits, key loggers, Trojan horse, and dialers, adware, malicious, spyware, rogue security software and other malicious programs. It is programmed by attackers to interrupt computer process, gatherDelicate Information, ...

متن کامل

ARCE Core Security Technologies

the next big one to surface. With the overwhelming amount of bug reports and security threats made public every day, it is daunting and difficult to identify trends and have a reasonable expectation of adopting a proac-tive information security strategy that deals with possible future threats. The Attack Trends department attempts to examine security bugs and exploitation programs and technique...

متن کامل

Efficient STAKCERT KDD Processes in Worm Detection

This paper presents a new STAKCERT KDD processes for worm detection. The enhancement introduced in the data-preprocessing resulted in the formation of a new STAKCERT model for worm detection. In this paper we explained in detail how all the processes involved in the STAKCERT KDD processes are applied within the STAKCERT model for worm detection. Based on the experiment conducted, the STAKCERT m...

متن کامل

GLOWS: A High Fidelity Worm Simulator

This work presents our GLOWS (Gateway Level Oregon Worm Simulator) simulator, designed to produce realistic worm traffic over a broad range of scenarios. GLOWS simulates the spread of a worm across the Internet and its propagation into a single domain with the goal of capturing the worm traffic that crosses the gateway point separating the monitored domain from the Internet.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1989