47,331 research outputs found

    The Legislative Response to the Evolution of Computer Viruses

    Get PDF
    On July 19, 2001, and again on July 31, 2001, the United States Government was attacked by a worm. The Code Red worm, a malevolent computer program, spread across the Internet impacting thousands of computers globally. The initial target of the Code Red worm was the White House website. Just days after the terrorist attacks in New York, Washington D.C., and Pennsylvania on September 11, the Nimda virus was unleashed on the Internet. By consuming up to ten percent of the Internet\u27s capacity, Nimda quickly received the distinction as the worst computer infestation to date

    The Code Red epidemic : a case study

    Full text link
    An analysis of log files from an immune World Wide Web server was used to discover the patterns of infection from the Code Red worm variants.  Analogies are drawn to biological systems.  The need for protection is commented on

    Analysis of Routing Worm Infection Rates on an IPV4 Network

    Get PDF
    Malicious logic, specifically worms, has caused monetary expenditure problems to network users in the past. Worms, like Slammer and Code Red, have infected thousands of systems and brought the Internet to a standstill. This research examines the ability of the original Slammer worm, the Slammer based routing worm proposed by Zou et al, and a new Single Slash Eight (SSE) routing worm proposed by this research to infect vulnerable systems within a given address space. This research investigates the Slammer worm\u27s ability to generate a uniform random IP addresses in a given address space. Finally, a comparison of the speed increase from computing systems available today versus those in use during the original Slammer release is performed. This research finds that the both the Slammer based routing worm and the SSE routing worm are faster than the original Slammer. The random number generator of the original Slammer worm does generate a statistically uniform distribution of addresses within the range under test. Further, this research shows that despite the previous research into the speed of worm propagation, there is a large void in testing worms on the systems available today that need to be investigated. The speed of the computing systems that the worms operated on in the past were more than three times slower than today\u27s systems. As the speed of computer systems continue to grow, the speed of worm propagation should increase with it as their scan rates directly relate to their infection rate. As such, the immunity of the future IPv6 network, from scanning worms may need to be reexamined

    History of malware

    Full text link
    In past three decades almost everything has changed in the field of malware and malware analysis. From malware created as proof of some security concept and malware created for financial gain to malware created to sabotage infrastructure. In this work we will focus on history and evolution of malware and describe most important malwares.Comment: 11 pages, 8 figures describing history and evolution of PC malware from first PC malware to Stuxnet, DoQu and Flame. This article has been withdrawed due some errors in text and publication in the jurnal that asked to withdraw article from other source

    Server scanning worm detection by using intelligent failure connection algorithm

    Get PDF
    On July 19th 2001, Code-Red was released to the internet. After fourteen hours the worn infected 36,000 hosts. Internet worn procedure spreads autonomously from one host to another, worm requires host computer with an address on the Internet and any of several vulnerabilities to create a big threat environment. The aim of this study is to propose Server Worm Register (SWD) to register the number of computers that are infected by the worm. Our proposal decreases the false alarm in Intelligent Failure Connection Algorithm (IFCA). Our proposal also works when the computer is infected by the worm and IFCDA detected the worm, many computers that are connected through the internet will receive the warning by using our proposal. We have found IFCA is more reliable by using SWD because it reduced the false alarm
    • …
    corecore