A taxonomy of computer worms

作者: Nicholas Weaver , Vern Paxson , Stuart Staniford , Robert Cunningham

DOI: 10.1145/948187.948190

关键词:

摘要: To understand the threat posed by computer worms, it is necessary to classes of attackers who may employ them, and potential payloads. This paper describes a preliminary taxonomy based on worm target discovery selection strategies, carrier mechanisms, activation, possible payloads, plausible would worm.

参考文章(15)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
Perry Wagle, Jonathan Walpole, Calton Pu, Steve Beattie, Aaron Grier, Crispin Cowan, Heather Hintony, Qian Zhang, Peat Bakke, Dave Maier, StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks usenix security symposium. pp. 5- 5 ,(1998)
James Cheney, Michael W. Hicks, Yanling Wang, Dan Grossman, J. Greg Morrisett, Trevor Jim, Cyclone: A Safe Dialect of C usenix annual technical conference. pp. 275- 288 ,(2002)
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, Inside the Slammer worm ieee symposium on security and privacy. ,vol. 1, pp. 33- 39 ,(2003) , 10.1109/MSECP.2003.1219056
Moti Yung, Adam Young, Cryptovirology: extortion-based security threats and countermeasures ieee symposium on security and privacy. pp. 129- 140 ,(1996) , 10.5555/525080.884259
Robert Wahbe, Steven Lucco, Thomas E. Anderson, Susan L. Graham, Efficient software-based fault isolation symposium on operating systems principles. ,vol. 27, pp. 203- 216 ,(1993) , 10.1145/168619.168635
David Moore, Colleen Shannon, k claffy, Code-Red: a case study on the spread and victims of an internet worm acm special interest group on data communication. pp. 273- 284 ,(2002) , 10.1145/637201.637244
S Schecter, M Smith, Access for sale: a new class of worm workshop on rapid malcode. pp. 19- 23 ,(2003) , 10.1145/948187.948191
M.W. Eichin, J.A. Rochlis, With microscope and tweezers: an analysis of the Internet virus of November 1988 ieee symposium on security and privacy. pp. 326- 343 ,(1989) , 10.1109/SECPRI.1989.36307
Z. Chen, L. Gao, K. Kwiat, Modeling the spread of active worms international conference on computer communications. ,vol. 3, pp. 1890- 1900 ,(2003) , 10.1109/INFCOM.2003.1209211