The internet worm program: an analysis

作者: Eugene H. Spafford

DOI: 10.1145/66093.66095

关键词:

摘要: On the evening of 2 November 1988, someone infected Internet with a worm program. That program exploited flaws in utility programs systems based on BSD-derived versions UNIX. The allowed to break into those machines and copy itself, thus infecting systems. This eventually spread thousands machines, disrupted normal activities connectivity for many days.This report gives detailed description components program---data functions. It is study two completely independent reverse-compilations version disassembled VAX assembly language. Almost no source code given paper because current concerns about state "immune system" hosts, but should be enough allow reader understand behavior program.The contains review security by program, some recommendations how eliminate or mitigate their future use. also includes an analysis coding style methods used author(s) worm, draws conclusions his abilities intent.

参考文章(10)
Fred Cohen, Computer viruses Computers & Security. ,vol. 6, pp. 22- 35 ,(1987) , 10.1016/0167-4048(87)90122-2
J. Postel, Simple Mail Transfer Protocol RFC821. ,vol. 788, pp. 1- 64 ,(1981)
F. T. Grampp, R. H. Morris, TheUNIXSystem: UNIXOperating System Security AT&T Bell Laboratories Technical Journal. ,vol. 63, pp. 1649- 1672 ,(1984) , 10.1002/J.1538-7305.1984.TB00058.X
John F. Shoch, Jon A. Hupp, The “worm” programs—early experience with a distributed computation Communications of The ACM. ,vol. 25, pp. 172- 180 ,(1982) , 10.1145/358453.358455
Donn Seeley, A Tour of the Worm ,(1988)
Robert Morris, Ken Thompson, Password security Communications of the ACM. ,vol. 22, pp. 594- 597 ,(1979) , 10.1145/359168.359172
Fred Cohen, Computer viruses—theory and experiments Rogue programs: viruses, worms and Trojan horses. pp. 356- 378 ,(1990)
John Brunner, The Shockwave Rider ,(1975)
A. K. Dewdney, Computer Recreations Scientific American. ,vol. 252, pp. 14- 23 ,(1985) , 10.1038/SCIENTIFICAMERICAN0385-14