The internet worm program: an analysis
@article{Spafford1989TheIW, title={The internet worm program: an analysis}, author={Eugene H. Spafford}, journal={Comput. Commun. Rev.}, year={1989}, volume={19}, pages={17-57} }
On the evening of 2 November 1988, someone infected the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versions of UNIX. The flaws allowed the program to break into those machines and copy itself, thus infecting those systems. This program eventually spread to thousands of machines, and disrupted normal activities and Internet connectivity for many days.This report gives a detailed description of the components of the worm program…
509 Citations
A failure to learn from the past
- Computer Science19th Annual Computer Security Applications Conference, 2003. Proceedings.
- 2003
A brief chronology of both the spread and eradication of the program, a presentation about how the program worked, and details of the aftermath are provided, which supports the title-that the community has failed to learn from the past.
A Study on Hierarchical Model of a Computer Worm Defense System
- Computer Science
- 2015
This research addresses the problem of computer worms in the modern Internet, a self-propagating computer program that is being increasingly and widely used to attack the Internet.
The Internet Worm Incident
- Computer ScienceESEC
- 1989
On the evening of 2 November 1988, someone “infected” Internet with a worm program that exploited flaws in utility programs in systems based on BSD-derived versions of Unix to break into machines and copy itself, thus infecting those systems.
The Internet Worm Incident Technical Report CSD-TR-933 *
- Computer Science
- 2007
On the evening of 2 November 1988, someone ‘‘infected’’ the Internet with a worm program that exploited flaws in utility programs in systems based on BSD-derived versions of UNIX, thus infecting those systems.
Crisis and Aftermath
- Computer Science
- 1999
On the evening of November 2, 1988 the Internet came under attack from within when a program was execuied on one or more hosts connected to the Internet, then used that information to break into other machines using flaws present in those systems’ software.
Modelling a Computer Worm Defense System
- Computer Science
- 2004
It is concluded that worms are dangerous to the Internet but there are ways and means to mitigate their effects, including prevention, prediction, detection and mitigation.
A Study on Friends Model of a Computer Worm Defense System
- Computer Science
- 2015
It is concluded that worms are dangerous to the Internet but there are ways and means to mitigate their ill-effects and models that can automatically respond to a worm outbreak are developed.
Detection of network threats using honeypots.
- Computer Science
- 2005
This project covers the design, implementation and evaluation of a distributed honeypot system that provides the facilities to centrally log threat information and demonstrated the systems ability to detect new threats within a short period of their first sighting.
Creating high-performance statically type-safe network applications
- Computer Science
- 2007
This dissertation proposes an architecture for constructing new implementations of standard Internet protocols which integrates mature formal methods not currently used in deployed servers and provides static guarantees against some classes of errors that are currently a major source of security problems.
References
SHOWING 1-10 OF 47 REFERENCES
A Tour of the Worm
- Computer Science
- 1988
This paper provides a chronology for the outbreak and presents a detailed description of the internals of the worm, based on a C version produced by decompiling.
Reflections on some recent widespread computer break-ins
- Geology
- 1987
In the first weeks of September 1986, some number of UNIX” systems in the San Francisco area, and elsewhere on the ARPANET, were systematically penetrated by talented intruder(s). We believe that it…
The UNIX system UNIX operating system security
- Computer ScienceAT&T Bell Laboratories Technical Journal
- 1984
Some of the security hazards of the UNIX™ operating system are discussed, and ways to protect against them are suggested, in the hope that an educated community of users will lead to a level of protection that is stronger, but far more importantly, that represents a reasonable and thoughtful balance between security and ease of use of the system.
Sendmail -- an internetwork mail router
- Computer Science
- 1986
Sendmail is designed to assist a graceful transition to consistent internetwork addressing schemes, and is intended to help bridge the gap between the totally ad hoc world of networks that know nothing of each other and the clean, tightly-coupled world of unique network numbers.
The “worm” programs—early experience with a distributed computation
- Computer ScienceCACM
- 1982
The “worm” programs were an experiment in the development of distributed computations: programs that span machine boundaries and also replicate themselves in idle machines. A “worm” is composed of…
Standard for the format of arpa intemet text messages
- Computer Science
- 1982
This document revises the specifications in RFC 733, in order to serve
the needs of the larger and more complex ARPA Internet. Some of RFC
733's features failed to gain adequate acceptance. In order…
Password security: a case history
- Computer ScienceCACM
- 1979
The present design of the password security scheme was the result of countering observed attempts to penetrate the system and is a compromise between extreme security and ease of use.
WHO Technical Report
- Environmental ScienceThe Yale Journal of Biology and Medicine
- 1954
The Feather River Coordinated Resource Management Group (FR-CRM) has been restoring channel/ meadow/ floodplain systems in the Feather River watershed since 1985 and recognized the possibility of a significant change in carbon stocks in these restored meadows and valleys.