Advertisement

Worms

  • David Salomon
Chapter
Part of the Undergraduate Topics in Computer Science book series (UTICS)

Abstract

A tapeworm is a parasite that lives inside the body of a bigger creature and sustains itself from its host’s resources. A software worm is a program that executes independently of other programs, replicates itself, and spreads through a network from computer to computer. A worm is a type of rogue software that resides in a host computer, but it is not a virus because it is not embedded in a host program. A worm propagates from host to host by exploiting a security hole or a vulnerability discovered by its creator. Section 3.4 shows how the Internet worm exploited security weaknesses in the finger and sendmail UNIX utilities. Section 2.11 describes a vulnerability in a decoder for jpeg images.

Keywords

Worm Propagation Address Book Security Hole Internet Worm Infected Computer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

  1. CDC (2004) is http://www.cdc.gov/.
  2. Code Red II (2001) “Code Red II: Another Worm Exploiting Buffer Overflow In IIS Indexing Service DLL,” CERT Incident Note IN-2001-09, Aug. 6. Available online at http://www.cert.org/incident_notes/IN-2001-09.html.
  3. Cohen, Frederick B. (1994a) A Short Course on Computer Viruses, 2nd edition, New York, NY, John Wiley & Sons.MATHGoogle Scholar
  4. CVE (2001) is CVE-2001-0500, Buffer overflow in ISAPI extension, available online at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0500.
  5. IIS (2004) is www.microsoft.com/iis.
  6. IOCCC (2004) is http://www.ioccc.org/.
  7. OpenSSL (2004) is the OpenSSL project, located at http://www.openssl.org.
  8. Rochlis, J., and M. Eichin (1989) “With Microscope and Tweezers: The Worm from MIT’s Perspective,” Communications of the ACM, 32(6):689– 698, June.CrossRefGoogle Scholar
  9. Shoch, John and Jon Hupp (1982) “The Worm Programs—Early Experience With a Distributed Computation,” Communications of the ACM, 25(3)172– 180. Reprinted in [Denning 90].CrossRefGoogle Scholar
  10. Staniford, Stuart, Vern Paxson, and Nicholas Weaver (2002) “How to Own the Internet in Your Spare Time,” Proceedings of the 11th USENIX Security Symposium (Security ’02). Available online at http://www.icir.org/vern/papers/cdc-usenix-sec02/index.html.
  11. Virus bulletin (2005) Virus Bulletin: The International Publication on Computer Virus Prevention, Recognition, and Removal. Available online at http://www.virusbtn.com/magazine/.

Copyright information

© Springer London 2010

Authors and Affiliations

  1. 1.Computer Science Dept.California State University, NorthridgeNorthridgeUSA

Personalised recommendations