Abstract
Last November the Internet was infected with a worm program that eventually spread to thousands of machines, disrupting normal activities and Internet connectivity for many days. The following article examines just how this worm operated.
- 1 Allman, E. Sendmait--An internetwork mail router. University of California, Berkeley, (issued with the BSD UNIX documentation), 1983.]]Google Scholar
- 2 Denning, P. The Internet worm. Amer. Sci. 77, 2 (Mar.-Apr. 1989}, 126-128.]]Google Scholar
- 3 Eichen, M.W., and Rochlis, J.A. With microscope and tweezers: An analysis of the Internet virus of November 1988. In Proceedings of the Symposium on Research in Security and Privacy (May 1989}. IEEE-CS, Oakland, Calif.]]Google Scholar
- 4 Grampp, F.T., and Morris, R.M. UNIX operating system security. AT&T Bell Laboratories Tech. J. 63, 8, part 2 (Oct. 1984}, 1649-1672.]]Google Scholar
- 5 Harrenstien, K. Name/Finger. RFC 742, SRI Network Information Center, Dec. 1977.]]Google Scholar
- 6 King, K.M. Overreaction to external attacks on computer systems could be more harmful than the viruses themselves. Chronicle of Higher Education (Nov. 23, 1988), A36.]]Google Scholar
- 7 Kocher, B. A hygiene lesson. Commun. ACM 32, 1 (Jan. 1989), 3.]] Google ScholarDigital Library
- 8 Morris, R., and Thompson, K. UNIX password security. Commun. ACM 22, 11 (Nov. 1979), 594-597.]] Google ScholarDigital Library
- 9 Postel, J.B. Simple mail transfer protocol. RFC 821, SRI Network Information Center, Aug. 1982.]] Google ScholarDigital Library
- 10 Proceedings of the virus post-mortem meeting. National Computer Security Center, Ft. George Meade, MD, Nov. 8, 1988.]]Google Scholar
- 11 Reid, B. Lessons from the UNIX breakins at Stanford. Software Engineering Notes 11, 5 (Oct. 1986), 29-35.]] Google ScholarDigital Library
- 12 Reid, B. Reflections on some recent widespread computer breakins. Commun. ACM 30, 2 (Feb. 1987}, 103-105.]] Google ScholarDigital Library
- 13 Ritchie, D.M. On the security of UNIX. In UNIX Supplementary Documents. AT&T, 1979.]]Google Scholar
- 14 Royko, M. Here's how to stop computer vandals. Chicago Tribune, (Nov. 6, 1988).]]Google Scholar
- 15 Seeley, D. A tour of the worm. In Proceedings of the 1989 Winter USENIX Conference. USENIX Association, San Diego, Calif., Feb. 1989.]]Google Scholar
- 16 Spafford, E.H. The Internet worm program: An analysis. Computer Communication Review 19, 1 (Jan. 1989). Also issued as Purdue CS technical report TR-CSD-823.]] Google ScholarDigital Library
- 17 Spafford, E.H. Some musings on ethics and computer breakins. In Proceedings of the Winter USENIX Conference. USENIX Association, San Diego, Calif., Feb. 1989.]]Google Scholar
- 18 Steiner, J., Neuman, C., and Schiller, J. Kerberos: An authentication service for open network systems. In Proceedings of the Winter USENIX Association Conference, Feb. 1988, pp. 191-202.]]Google Scholar
- 19 Uncle Sam's anti-virus corps. UNIX Today!. (Jan. 23, 1989), 1o.]]Google Scholar
Index Terms
- Crisis and aftermath
Recommendations
Analyzing the Aftermath of the McColo Shutdown
SAINT '09: Proceedings of the 2009 Ninth Annual International Symposium on Applications and the InternetThis paper examines how spam behavior was impacted by the shutdown of McColo, a service provider known for its lax security enforcement. Since the shutdown, a variety of sources have reported significant changes to global spam patterns. In an effort to ...
Crisis Management
Multiple recent disasters have put crisis management in the limelight. Consequently, many IT-related research efforts are under way to bring transformational changes to first responder and response organizations’ ability to contain and mitigate crises.
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
ECBS '07: Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based SystemsIn today's computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defense and security. To protect computers from the ever-increasing threat of ...
Comments