skip to main content
10.1145/948187.948189acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Recent worms: a survey and trends

Published:27 October 2003Publication History

ABSTRACT

In this paper, we present a broad overview of recent worm activity. Virus information repositories, such as the Network Associates' Virus Information Library, contain over 4500 different entries (through the first quarter of 2003). While many of these entries are interesting, a great number of them are now simply historical and a large percentage of them are completely derivative in nature. However, these virus information repositories are the best source of material on the breadth of malicious code, including worms.This paper is meant to provide worm researchers with a high-level roadmap to the vast body of virus and worm information. After sifting through hundreds of entries, we present only those that we considered breakthrough or novel, primarily from a technical perspective. As a result, we found ourselves omitting some of the most notorious worms simply because they lacked any original aspects. It is our hope that others in the community who need to get up to speed in the worm literature can benefit from this survey. While this study does not contain any original research, it provides an overview of worms using a truly breadth-first approach, which has been lacking in the existing worm literature.From this raw data, we have also extracted a number of broad quantitative and qualitative trends that we have found to be interesting. We believe that a workshop discussion of these, and other thoughts, will be engaging and informative.

References

  1. Eichin, M. and J. Rochlis. "With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988". Proceedings of the 1989 IEEE Symposium on Security and Privacy (Oakland CA, May 1989), IEEE Computer Society, 326--344.Google ScholarGoogle ScholarCross RefCross Ref
  2. F-Secure. F-Secure Computer Virus Information Center. http://www.f-secure.com/v-descs, 2003.Google ScholarGoogle Scholar
  3. F-Secure. "F-Secure Corporation Virus Glossary". http://www.f-secure.com/virus-info/glossary.shtml, May 2003.Google ScholarGoogle Scholar
  4. Grimes, R. "Danger: Remote Access Trojans". Security Administrator, http://www.microsoft.com/technet/security/ virus/VirusRAT.asp, September 2002.Google ScholarGoogle Scholar
  5. Kaspersky, E. Computer Viruses. Kaspersky Lab, http://www.viruslist.com/eng/viruslistbooks.html, 2000.Google ScholarGoogle Scholar
  6. Lemos, R. "Year of the Worm: Fast-spreading code is weapon of choice for Net vandals". CNET News.com, http://news.com.com/2009-1001-254061.html, March 2001.Google ScholarGoogle Scholar
  7. Moore, D., V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. "Slammer Worm Dissection: Inside the Slammer Worm". IEEE Security & Privacy, Vol. 1 No. 4 (July-August 2003), 33--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Moore, D., C. Shannon, and J. Brown. "Code-Red: a case study on the spread and victims of an internet worm". Proceedings of the Internet Measurement Workshop 2002 (Marseille France, November 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Network Associates. Virus Information Library. http://vil.nai.com, 2003.Google ScholarGoogle Scholar
  10. Network Associates. "Virus Glossary". http://mcafeeb2b.com/naicommon/avert/avert-research-center/virus-glossary.asp, 2003.Google ScholarGoogle Scholar
  11. SANS Institute. "SANS Glossary of Terms Used in Security and Intrusion Detection". http://www.sans.org/resources/ glossary.php, May 2003.Google ScholarGoogle Scholar
  12. Shoch, J. and J. Hupp. "The Worm Programs: Early Experience with a Distributed Computation". Communications of the ACM, Vol. 25 No. 3 (March 1982), 172--180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Sophos. "Klez worm is most prolific virus of the year". Sophos Press Releases, http://www.sophos.com/pressrel/uk/ 20021204yeartopten.html, December 2002.Google ScholarGoogle Scholar
  14. Spafford, E. "The Internet Worm Program: An Analysis". Purdue Technical Report CSD-TR-823, http://www.cerias.purdue.edu/homes/spaf/tech-reps/823.pdf, December 1988.Google ScholarGoogle Scholar
  15. Staniford, S., V. Paxson, and N. Weaver. "How to 0wn the Internet in Your Spare Time". Proceedings of the 11th USENIX Security Symposium (San Francisco CA, August 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Symantec. Symantec Security Response - Search and Expanded Threats Page. http://securityresponse.symantec.com/avcenter/ vinfodb.html, 2003.Google ScholarGoogle Scholar
  17. Symantec. "What is the difference between viruses, worms, and Trojans?". http://service1.symantec.com/SUPPORT/ nav.nsf/pfdocs/1999041209131106, November 2002.Google ScholarGoogle Scholar

Index Terms

  1. Recent worms: a survey and trends

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WORM '03: Proceedings of the 2003 ACM workshop on Rapid malcode
        October 2003
        92 pages
        ISBN:1581137850
        DOI:10.1145/948187

        Copyright © 2003 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 October 2003

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader