An assessment of the contemporary threat posed by network worm malware

作者: Khurram Shahzad , Steve Woodhead , Luc Tidy , Muhammad Aminu Ahmad

DOI:

关键词:

摘要: The cost of a zero-day network worm outbreak has been estimated to be up US$2.6 billion. Additionally zeroday outbreaks have observed that spread at significant pace across the global Internet, with an infection level more than 90 percent vulnerable hosts within 10 minutes. threat posed by such fast-spreading malware is therefore significant, particularly given fact operator / administrator intervention not likely take effect typical epidemiological timescale infections. This paper presents classification wormable vulnerabilities, demonstrating method determine if vulnerability wormable, and survey into cause reduction in recent years, as well their viability future. It then goes on explore points out issues operating system security relation techniques used worms.

参考文章(16)
Thomas Ptacek, Jose Nazario, Dug Song, Wormability: A Description for Vulnerabilities ,(2004)
Vern Paxson, Stuart Staniford, Nicholas Weaver, Stefan Savage, Colleen Shannon, David Moore, The Spread of the Sapphire/Slammer Worm ,(2003)
Tielei Wang, Long Lu, Kangjie Lu, Wenke Lee, Simon Chung, Jekyll on iOS: when benign apps become evil usenix security symposium. pp. 559- 572 ,(2013)
R. Hund, C. Willems, T. Holz, Practical Timing Side Channel Attacks against Kernel Space ASLR ieee symposium on security and privacy. pp. 191- 205 ,(2013) , 10.1109/SP.2013.23
Eugene H. Spafford, The internet worm program: an analysis ACM SIGCOMM Computer Communication Review. ,vol. 19, pp. 17- 57 ,(1989) , 10.1145/66093.66095
Cliff Changchun Zou, Weibo Gong, Don Towsley, Code red worm propagation modeling and analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 138- 147 ,(2002) , 10.1145/586110.586130
Luc Tidy, Steve Woodhead, Jodie Wetherall, Simulation of zero-day worm epidemiology in the dynamic, heterogeneous Internet The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology. ,vol. 12, pp. 123- 138 ,(2015) , 10.1177/1548512913507153
Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert Cunningham, A taxonomy of computer worms workshop on rapid malcode. pp. 11- 18 ,(2003) , 10.1145/948187.948190
C. Shannon, D. Moore, The spread of the Witty worm ieee symposium on security and privacy. ,vol. 2, pp. 46- 50 ,(2004) , 10.1109/MSP.2004.59