skip to main content
article
Free Access

Crisis and aftermath

Published:01 June 1989Publication History
Skip Abstract Section

Abstract

Last November the Internet was infected with a worm program that eventually spread to thousands of machines, disrupting normal activities and Internet connectivity for many days. The following article examines just how this worm operated.

References

  1. 1 Allman, E. Sendmait--An internetwork mail router. University of California, Berkeley, (issued with the BSD UNIX documentation), 1983.]]Google ScholarGoogle Scholar
  2. 2 Denning, P. The Internet worm. Amer. Sci. 77, 2 (Mar.-Apr. 1989}, 126-128.]]Google ScholarGoogle Scholar
  3. 3 Eichen, M.W., and Rochlis, J.A. With microscope and tweezers: An analysis of the Internet virus of November 1988. In Proceedings of the Symposium on Research in Security and Privacy (May 1989}. IEEE-CS, Oakland, Calif.]]Google ScholarGoogle Scholar
  4. 4 Grampp, F.T., and Morris, R.M. UNIX operating system security. AT&T Bell Laboratories Tech. J. 63, 8, part 2 (Oct. 1984}, 1649-1672.]]Google ScholarGoogle Scholar
  5. 5 Harrenstien, K. Name/Finger. RFC 742, SRI Network Information Center, Dec. 1977.]]Google ScholarGoogle Scholar
  6. 6 King, K.M. Overreaction to external attacks on computer systems could be more harmful than the viruses themselves. Chronicle of Higher Education (Nov. 23, 1988), A36.]]Google ScholarGoogle Scholar
  7. 7 Kocher, B. A hygiene lesson. Commun. ACM 32, 1 (Jan. 1989), 3.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 Morris, R., and Thompson, K. UNIX password security. Commun. ACM 22, 11 (Nov. 1979), 594-597.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 Postel, J.B. Simple mail transfer protocol. RFC 821, SRI Network Information Center, Aug. 1982.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 Proceedings of the virus post-mortem meeting. National Computer Security Center, Ft. George Meade, MD, Nov. 8, 1988.]]Google ScholarGoogle Scholar
  11. 11 Reid, B. Lessons from the UNIX breakins at Stanford. Software Engineering Notes 11, 5 (Oct. 1986), 29-35.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12 Reid, B. Reflections on some recent widespread computer breakins. Commun. ACM 30, 2 (Feb. 1987}, 103-105.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13 Ritchie, D.M. On the security of UNIX. In UNIX Supplementary Documents. AT&T, 1979.]]Google ScholarGoogle Scholar
  14. 14 Royko, M. Here's how to stop computer vandals. Chicago Tribune, (Nov. 6, 1988).]]Google ScholarGoogle Scholar
  15. 15 Seeley, D. A tour of the worm. In Proceedings of the 1989 Winter USENIX Conference. USENIX Association, San Diego, Calif., Feb. 1989.]]Google ScholarGoogle Scholar
  16. 16 Spafford, E.H. The Internet worm program: An analysis. Computer Communication Review 19, 1 (Jan. 1989). Also issued as Purdue CS technical report TR-CSD-823.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17 Spafford, E.H. Some musings on ethics and computer breakins. In Proceedings of the Winter USENIX Conference. USENIX Association, San Diego, Calif., Feb. 1989.]]Google ScholarGoogle Scholar
  18. 18 Steiner, J., Neuman, C., and Schiller, J. Kerberos: An authentication service for open network systems. In Proceedings of the Winter USENIX Association Conference, Feb. 1988, pp. 191-202.]]Google ScholarGoogle Scholar
  19. 19 Uncle Sam's anti-virus corps. UNIX Today!. (Jan. 23, 1989), 1o.]]Google ScholarGoogle Scholar

Index Terms

  1. Crisis and aftermath

          Recommendations

          Reviews

          Thomas C. Richards

          This paper contains a detailed analysis of the Internet worm incident, which occurred in November 1988. During the evening of November 2 the worm spread quickly to Sun 3 systems and VAX computers running 4 BSD UNIX. As time went on these machines became so loaded that they were unable to continue processing. Within several hours effective methods of stopping the invading program had been discovered. This paper contains a complete analysis of how the Internet worm operated and of the aftermath of its release. This includes how bugs in the fingerd and sendmail software in UNIX were exploited and how the attacker used common lists of passwords until a match was found. A detailed overview of how the worm program functioned is also presented. The author concludes his discussion with the moral, ethical, and legal issues related to this type of computer security breach.

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Communications of the ACM
            Communications of the ACM  Volume 32, Issue 6
            June 1989
            92 pages
            ISSN:0001-0782
            EISSN:1557-7317
            DOI:10.1145/63526
            Issue’s Table of Contents

            Copyright © 1989 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 June 1989

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader