Crisis and aftermath

@article{Spafford1989CrisisAA,
  title={Crisis and aftermath},
  author={E. Spafford},
  journal={Commun. ACM},
  year={1989},
  volume={32},
  pages={678-687}
}
  • E. Spafford
  • Published 1989
  • Business, Computer Science
  • Commun. ACM
  • Last November the Internet was infected with a worm program that eventually spread to thousands of machines, disrupting normal activities and Internet connectivity for many days. The following article examines just how this worm operated. 
    130 Citations

    Topics from this paper

    The Internet Worm Incident
    • 84
    • PDF
    Viruses, Worms, and Trojan Horses
    • 2
    The Changing Global Internet Service Infrastructure
    • 3
    • PDF
    Internet security: firewalls and beyond
    • 152
    Security vulnerabilities in command and control interoperability
    • J. Hamilton
    • Computer Science
    • IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003.
    • 2003
    • 1
    Internet quarantine: requirements for containing self-propagating code
    • D. Moore, C. Shannon, G. Voelker, S. Savage
    • Computer Science
    • IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428)
    • 2003
    • 603
    • PDF
    Adversary Games in Secure/Reliable Network Routing
    • 3
    • PDF
    The case for TCP/IP puzzles
    • 59
    • PDF