5,157 research outputs found

    The internet worm

    Get PDF
    In November 1988 a worm program invaded several thousand UNIX-operated Sun workstations and VAX computers attached to the Research Internet, seriously disrupting service for several days but damaging no files. An analysis of the work's decompiled code revealed a battery of attacks by a knowledgeable insider, and demonstrated a number of security weaknesses. The attack occurred in an open network, and little can be inferred about the vulnerabilities of closed networks used for critical operations. The attack showed that passwork protection procedures need review and strengthening. It showed that sets of mutually trusting computers need to be carefully controlled. Sharp public reaction crystalized into a demand for user awareness and accountability in a networked world

    A Study on Hierarchical Model of a Computer Worm Defense System

    Full text link
    This research addresses the problem of computer worms in the modern Internet. A worm is similar to a virus. A worm is a self-propagating computer program that is being increasingly and widely used to attack the Internet. It is considered as a sub-class of a virus because it is also capable of spreading from one computer to another. Worms are also computer programs that are capable of replicating copies of themselves via network connections. What makes it different however is that unlike a computer virus a computer worm can run itself without any human intervention? Because of these two qualities of a worm, it is possible that there will be thousands of worms in a computer even if only one computer worm is transferred. For instance, the worm may send a copy of itself to every person listed in the e-mail address book. The worm sent may then send a copy of itself to every person who is listed in the address book of the person who receives the email. Because this may go on ad infinitum worms can not only cause damage to a single computer and to other persons computer but it can only affect the functionality of Web servers and network servers to the point that they can no longer function efficiently. One example is the .blaster worm

    Threats and countermeasures for network security

    Get PDF
    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented

    PISCES: An environment for parallel scientific computation

    Get PDF
    The parallel implementation of scientific computing environment (PISCES) is a project to provide high-level programming environments for parallel MIMD computers. Pisces 1, the first of these environments, is a FORTRAN 77 based environment which runs under the UNIX operating system. The Pisces 1 user programs in Pisces FORTRAN, an extension of FORTRAN 77 for parallel processing. The major emphasis in the Pisces 1 design is in providing a carefully specified virtual machine that defines the run-time environment within which Pisces FORTRAN programs are executed. Each implementation then provides the same virtual machine, regardless of differences in the underlying architecture. The design is intended to be portable to a variety of architectures. Currently Pisces 1 is implemented on a network of Apollo workstations and on a DEC VAX uniprocessor via simulation of the task level parallelism. An implementation for the Flexible Computing Corp. FLEX/32 is under construction. An introduction to the Pisces 1 virtual computer and the FORTRAN 77 extensions is presented. An example of an algorithm for the iterative solution of a system of equations is given. The most notable features of the design are the provision for several granularities of parallelism in programs and the provision of a window mechanism for distributed access to large arrays of data
    corecore