Computer Worms, Detection and Defense

Since the first widespread Internet worm incident in 1988, computer worms have become a major Internet threat and a subject of increasing academic research. This worm, known as the Morris Worm, was written by Cornell University student Robert Morris. Morris’s worm infected Sun Microsystems Sun 3 and...

Full description

Saved in:
Bibliographic Details
Main Authors: COLE, R., CHU, Chao-Hsien
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2008
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/233
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1232
record_format dspace
spelling sg-smu-ink.sis_research-12322010-09-24T05:42:03Z Computer Worms, Detection and Defense COLE, R. CHU, Chao-Hsien Since the first widespread Internet worm incident in 1988, computer worms have become a major Internet threat and a subject of increasing academic research. This worm, known as the Morris Worm, was written by Cornell University student Robert Morris. Morris’s worm infected Sun Microsystems Sun 3 and VAX hosts running versions of 4 BSD UNIX by exploiting flaws in several standard services. Although there is no strong consensus as to the definition of a worm (Kienzle & Elder, 2003), the general notion of a worm can be understood by way of contrast with viruses. A virus is a program that can ‘infect’ another program through modification to include a copy of itself (Cohen, 1984). Worms, in contrast, are often characterized as not requiring another program for execution or another agent for activation—that is, a worm can execute and propagate itself autonomously (Spafford, 1988). This characterization of worms as malcode that does not require human intervention for propagation is, however, not universally accepted. For example, Kienzle and Elder (2003) define worms as malicious code that propagates over a network, either with or without human intervention. Such a definition includes e-mail-based mass-mailer viruses, a category that would be largely excluded if the need for human intervention is excluded from the definition of a worm. 2008-01-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/233 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
COLE, R.
CHU, Chao-Hsien
Computer Worms, Detection and Defense
description Since the first widespread Internet worm incident in 1988, computer worms have become a major Internet threat and a subject of increasing academic research. This worm, known as the Morris Worm, was written by Cornell University student Robert Morris. Morris’s worm infected Sun Microsystems Sun 3 and VAX hosts running versions of 4 BSD UNIX by exploiting flaws in several standard services. Although there is no strong consensus as to the definition of a worm (Kienzle & Elder, 2003), the general notion of a worm can be understood by way of contrast with viruses. A virus is a program that can ‘infect’ another program through modification to include a copy of itself (Cohen, 1984). Worms, in contrast, are often characterized as not requiring another program for execution or another agent for activation—that is, a worm can execute and propagate itself autonomously (Spafford, 1988). This characterization of worms as malcode that does not require human intervention for propagation is, however, not universally accepted. For example, Kienzle and Elder (2003) define worms as malicious code that propagates over a network, either with or without human intervention. Such a definition includes e-mail-based mass-mailer viruses, a category that would be largely excluded if the need for human intervention is excluded from the definition of a worm.
format text
author COLE, R.
CHU, Chao-Hsien
author_facet COLE, R.
CHU, Chao-Hsien
author_sort COLE, R.
title Computer Worms, Detection and Defense
title_short Computer Worms, Detection and Defense
title_full Computer Worms, Detection and Defense
title_fullStr Computer Worms, Detection and Defense
title_full_unstemmed Computer Worms, Detection and Defense
title_sort computer worms, detection and defense
publisher Institutional Knowledge at Singapore Management University
publishDate 2008
url https://ink.library.smu.edu.sg/sis_research/233
_version_ 1770570346964975616