skip to main content
10.1145/948187.948190acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

A taxonomy of computer worms

Published:27 October 2003Publication History

ABSTRACT

To understand the threat posed by computer worms, it is necessary to understand the classes of worms, the attackers who may employ them, and the potential payloads. This paper describes a preliminary taxonomy based on worm target discovery and selection strategies, worm carrier mechanisms, worm activation, possible payloads, and plausible attackers who would employ a worm.

References

  1. Simon Byers, Aviel Rubin, and David Kormann. Defending against internet-based attack on the physical world, http://www.avirubin.com/lscripted.attacks.pdf.Google ScholarGoogle Scholar
  2. Cardcops. http://www.cardcops.com.Google ScholarGoogle Scholar
  3. CERT. CERT Advisory CA-1999-04 Melissa Macro Virus, http://www.cert.org/advisories/ca-1999-04.html.Google ScholarGoogle Scholar
  4. CERT. CERT Advisory CA-2000-04 Love Letter Worm, http://www.cert.org/advisories/ca-2000-04.html.Google ScholarGoogle Scholar
  5. CERT. CERT Advisory CA-2001-22 w32/Sircam Malicious Code, http://www.cert.org/advisories/ca-2001-22.html.Google ScholarGoogle Scholar
  6. CERT. CERT Advisory CA-2001-26 Nimda Worm, http://www.cert.org/advisories/ca-2001-26.html.Google ScholarGoogle Scholar
  7. CERT. CERT Advisory CA-2002-25 Integer Overflow in XDR Library, http://www.cert.org/advisories/ca-2002-25.html.Google ScholarGoogle Scholar
  8. CERT. Code Red II: Another Worm Exploting Buffer Overflow in IIS Indexing Service DLL, http://www.cert.org/incident_notes/in-2001-09.html.Google ScholarGoogle Scholar
  9. Zesheng Chen, Lixin Gao, and Kevin Kwiat. Modeling the spread of active worms. In IEEE INFOCOM 2003. IEEE, April 2003.Google ScholarGoogle ScholarCross RefCross Ref
  10. ComputerWorld. Al-qaeda poses threat to net, http://www.computerworld.com/securitytopics/story/0,10801,76150,00.html.Google ScholarGoogle Scholar
  11. Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, and Heather Hinton. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proc. 7th USENIX Security Conference, pages 63--78, San Antonio, Texas, jan 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Silicon Defense. Countermalice worm containment, http://www.silicondefense.com/products/countermalice/.Google ScholarGoogle Scholar
  13. David Dittrich. The Stacheldraht Distributed Denial of Service Attack Tool, http://staff.washington.edu/dittrich/misc/stacheldraht.analysis.Google ScholarGoogle Scholar
  14. David Dittrich. The Tribe Flood Network Distributed Denial of Service Attack Tool, http://staff.washington.edu/dittrich/misc/tfn.analysis.Google ScholarGoogle Scholar
  15. eEye Digital Security. .ida "Code Red" Worm, http://www.eeye.com/html/research/advisories/al20010717.html.Google ScholarGoogle Scholar
  16. Mark Eichin and Jon Rochlis. With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. In IEEE Computer Society Symposium on Security and Privacy, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  17. Hiroaki Etoh. Gcc extentions for protecting applications from stack-smashing attacks, http://www.research.ibm.com/trl/projects/security/ssp/.Google ScholarGoogle Scholar
  18. F-Secure. F-Secure Computer Virus Information Pages: Hybris, http://www.f-secure.com/v-descs/hybris.shtml.Google ScholarGoogle Scholar
  19. Peter Ferrie. W32//Klez, http://toronto.virusbtn.com/magazine/archives/200207/klez.xml.Google ScholarGoogle Scholar
  20. Security Focus. MacOS X SoftwareUpdate Arbitrary Package Installation Vulnerability, http://online.securityfocus.com/bid/5176.Google ScholarGoogle Scholar
  21. The Animal Liberation Front. http://www.animalliberationfront.com.Google ScholarGoogle Scholar
  22. The Earth Liberation Front. In defense of all life, http://www.earthliberationfront.com.Google ScholarGoogle Scholar
  23. Gamespy. Gamespy arcade, http://www.gamespyarcade.com.Google ScholarGoogle Scholar
  24. Symantec Inc. W32.gnuman.worm, http://securityresponse.symantec.com/avcenter/venc/data/w32.gnuman.worm.html.Google ScholarGoogle Scholar
  25. itsecure. OpenSSH Trojan Horse, http://www.itsecure.com.au/alerts/alert.htm?alertid=95.Google ScholarGoogle Scholar
  26. T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In USENIX Annual Technical Conference, Monterey, CA, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Markus Kern. Re: Codegreen beta release, http://online.securityfocus.com/archive/82/211462.Google ScholarGoogle Scholar
  28. Kaspersky Labs. W95/CIH (a.k.a Chernobyl), http://www.viruslist.com/eng/viruslist.html?id=3204.Google ScholarGoogle Scholar
  29. Message Labs. W32/bugbear-ww, http://www.messagelabs.com/viruseye/report.asp?id=110.Google ScholarGoogle Scholar
  30. Brian McWilliams. Yaha Worm Takes out Pakistan Government's Site, http://online.securityfocus.com/news/501.Google ScholarGoogle Scholar
  31. Jason V Miller, Jesse Gough, Bartek Kostanecki, Josh Talbot, and Jensenne Roculan. Microsoft dcom rpc worm alert, https://tms.symantec.com/members/analystreports/030811-alert-dcomworm.pdf.Google ScholarGoogle Scholar
  32. Domas Mituzas. FreeBSD Scalper Worm, http://www.dammit.lt/apache-worm/.Google ScholarGoogle Scholar
  33. David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weaver. Inside the slammer worm. IEEE Magazine of Security and Privacy, pages 33--39, July/August 2003 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. David Moore, Colleen Shannon, and k claffy. Code-red: a case study on the spread and victims of an Internet worm. In The Second Internet Measurement Workshop, pages 273--284, November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. George Necula, Scott McPeak, and Westley Weimer. CCured: Type-Safe Retrofitting of Legacy Code. In Proceedings of the Principles of Programming Languages. ACM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Netcraft. The Netcraft Survey, http://www.netcraft.com.Google ScholarGoogle Scholar
  37. Openbsd 3.3, http://www.openbsd.org/33.html.Google ScholarGoogle Scholar
  38. The homepage of the pax team, http://pageexec.virtualave.net/.Google ScholarGoogle Scholar
  39. Sam Phillips. dasbistro.com default.ida responder. http://sunsite.bilkent.edu.tr/pub/infosystems/phpweb/default.txt.Google ScholarGoogle Scholar
  40. The Honeynet Project. Know Your Enemy: Motives, http://project.honeynet.org/papers/motives/.Google ScholarGoogle Scholar
  41. Eric Rescorla. Security holes .. who cares? In Proceedings of the 12th USENIX Security Symposium, pages 75--90. USENIX, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Stuart Schechter and Michael Smith. Access for sale: A new class of worm. In First Workshop on Rapid Malcode WORM, October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Markus Schmall. Bulding Anna Kournikova: An Analysis of the VBSWG Worm Kit, http://online.securityfocus.com/infocus/1287.Google ScholarGoogle Scholar
  44. McAffe Secuirty. W95/firkin.worm, http://vil.mcafee.com/dispvirus.asp?virus\_k=98557.Google ScholarGoogle Scholar
  45. F secure Inc. Global slapper worm information center, http://www.f-secure.com/slapper/.Google ScholarGoogle Scholar
  46. Valve Software. Half life, http://www.half-life.com.Google ScholarGoogle Scholar
  47. Stuart Staniford, Vern Paxson, and Nicholas Weaver. How to 0wn the Internet in Your Spare Time. In Proceedings of the 11th USENIX Security Symposium. USENIX, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Joe Stewart. Sobig.e: Evolution of the worm. http://www.lurhq.com/sobig-e.html.Google ScholarGoogle Scholar
  49. Symantec. W32.Benjamin.Worm, http://securityresponse.symantec.com/avcenter/venc/data/w32.benjamin.worm.html.Google ScholarGoogle Scholar
  50. Symantec. W32.Sonic.worm, http://securityresponse.symantec.com/avcenter/venc/data/w32.sonic.worm.html.Google ScholarGoogle Scholar
  51. Jamie Twycross and Matthew M Williamson. Implementing and testing a virus throttle. In Proceedings of the 12th USENIX Security Symposium, pages 285--294. USENIX, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Max Vision. Whitehats: Ramen Internet Worm Analysis, http://www.whitehats.com/library/worms/ramen/.Google ScholarGoogle Scholar
  53. Robert Wahbe, Steven Lucco, Thomas E. Anderson, and Susan L. Graham. Efficient Software-Based Fault Isolation. ACM SIGOPS Operating Systems Review, 27(5):203--216, December 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Matthew M Williamson. Throttling viruses: Restricting propigation to defeat mobil malicious code. In Annual Computer Security Applications Conference, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Adam Young and Moti Yung. Cryptovirology: Extortion based security threats and countermeasures. In IEEE Symposium on Security and Privacy, pages 129--141, Oakland, CA, 1996. IEEE Computer Society Press. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A taxonomy of computer worms

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WORM '03: Proceedings of the 2003 ACM workshop on Rapid malcode
        October 2003
        92 pages
        ISBN:1581137850
        DOI:10.1145/948187

        Copyright © 2003 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 October 2003

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader