The internet worm program: an analysis

@article{Spafford1989TheIW,
  title={The internet worm program: an analysis},
  author={Eugene H. Spafford},
  journal={Comput. Commun. Rev.},
  year={1989},
  volume={19},
  pages={17-57}
}
  • E. Spafford
  • Published 3 January 1989
  • Computer Science
  • Comput. Commun. Rev.
On the evening of 2 November 1988, someone infected the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versions of UNIX. The flaws allowed the program to break into those machines and copy itself, thus infecting those systems. This program eventually spread to thousands of machines, and disrupted normal activities and Internet connectivity for many days.This report gives a detailed description of the components of the worm program… 
A failure to learn from the past
  • E. Spafford
  • Computer Science
    19th Annual Computer Security Applications Conference, 2003. Proceedings.
  • 2003
TLDR
A brief chronology of both the spread and eradication of the program, a presentation about how the program worked, and details of the aftermath are provided, which supports the title-that the community has failed to learn from the past.
A Study on Hierarchical Model of a Computer Worm Defense System
TLDR
This research addresses the problem of computer worms in the modern Internet, a self-propagating computer program that is being increasingly and widely used to attack the Internet.
The Internet Worm Incident
TLDR
On the evening of 2 November 1988, someone “infected” Internet with a worm program that exploited flaws in utility programs in systems based on BSD-derived versions of Unix to break into machines and copy itself, thus infecting those systems.
The Internet Worm Incident Technical Report CSD-TR-933 *
TLDR
On the evening of 2 November 1988, someone ‘‘infected’’ the Internet with a worm program that exploited flaws in utility programs in systems based on BSD-derived versions of UNIX, thus infecting those systems.
Crisis and Aftermath
TLDR
On the evening of November 2, 1988 the Internet came under attack from within when a program was execuied on one or more hosts connected to the Internet, then used that information to break into other machines using flaws present in those systems’ software.
Modelling a Computer Worm Defense System
TLDR
It is concluded that worms are dangerous to the Internet but there are ways and means to mitigate their effects, including prevention, prediction, detection and mitigation.
A Study on Friends Model of a Computer Worm Defense System
TLDR
It is concluded that worms are dangerous to the Internet but there are ways and means to mitigate their ill-effects and models that can automatically respond to a worm outbreak are developed.
Detection of network threats using honeypots.
TLDR
This project covers the design, implementation and evaluation of a distributed honeypot system that provides the facilities to centrally log threat information and demonstrated the systems ability to detect new threats within a short period of their first sighting.
Creating high-performance statically type-safe network applications
TLDR
This dissertation proposes an architecture for constructing new implementations of standard Internet protocols which integrates mature formal methods not currently used in deployed servers and provides static guarantees against some classes of errors that are currently a major source of security problems.
...
...

References

SHOWING 1-10 OF 47 REFERENCES
A Tour of the Worm
TLDR
This paper provides a chronology for the outbreak and presents a detailed description of the internals of the worm, based on a C version produced by decompiling.
Reflections on some recent widespread computer break-ins
In the first weeks of September 1986, some number of UNIX” systems in the San Francisco area, and elsewhere on the ARPANET, were systematically penetrated by talented intruder(s). We believe that it
The UNIX system UNIX operating system security
TLDR
Some of the security hazards of the UNIX™ operating system are discussed, and ways to protect against them are suggested, in the hope that an educated community of users will lead to a level of protection that is stronger, but far more importantly, that represents a reasonable and thoughtful balance between security and ease of use of the system.
Sendmail -- an internetwork mail router
TLDR
Sendmail is designed to assist a graceful transition to consistent internetwork addressing schemes, and is intended to help bridge the gap between the totally ad hoc world of networks that know nothing of each other and the clean, tightly-coupled world of unique network numbers.
The “worm” programs—early experience with a distributed computation
The “worm” programs were an experiment in the development of distributed computations: programs that span machine boundaries and also replicate themselves in idle machines. A “worm” is composed of
Standard for the format of arpa intemet text messages
This document revises the specifications in RFC 733, in order to serve the needs of the larger and more complex ARPA Internet. Some of RFC 733's features failed to gain adequate acceptance. In order
Computer viruses: Theory and experiments
  • F. Cohen
  • Computer Science
    Comput. Secur.
  • 1987
Password security: a case history
TLDR
The present design of the password security scheme was the result of countering observed attempts to penetrate the system and is a compromise between extreme security and ease of use.
WHO Technical Report
  • J. Meigs
  • Environmental Science
    The Yale Journal of Biology and Medicine
  • 1954
TLDR
The Feather River Coordinated Resource Management Group (FR-CRM) has been restoring channel/ meadow/ floodplain systems in the Feather River watershed since 1985 and recognized the possibility of a significant change in carbon stocks in these restored meadows and valleys.
...
...