Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Crisis and aftermath

Published: 01 June 1989 Publication History

Abstract

Last November the Internet was infected with a worm program that eventually spread to thousands of machines, disrupting normal activities and Internet connectivity for many days. The following article examines just how this worm operated.

References

[1]
Allman, E. Sendmait--An internetwork mail router. University of California, Berkeley, (issued with the BSD UNIX documentation), 1983.]]
[2]
Denning, P. The Internet worm. Amer. Sci. 77, 2 (Mar.-Apr. 1989}, 126-128.]]
[3]
Eichen, M.W., and Rochlis, J.A. With microscope and tweezers: An analysis of the Internet virus of November 1988. In Proceedings of the Symposium on Research in Security and Privacy (May 1989}. IEEE-CS, Oakland, Calif.]]
[4]
Grampp, F.T., and Morris, R.M. UNIX operating system security. AT&T Bell Laboratories Tech. J. 63, 8, part 2 (Oct. 1984}, 1649-1672.]]
[5]
Harrenstien, K. Name/Finger. RFC 742, SRI Network Information Center, Dec. 1977.]]
[6]
King, K.M. Overreaction to external attacks on computer systems could be more harmful than the viruses themselves. Chronicle of Higher Education (Nov. 23, 1988), A36.]]
[7]
Kocher, B. A hygiene lesson. Commun. ACM 32, 1 (Jan. 1989), 3.]]
[8]
Morris, R., and Thompson, K. UNIX password security. Commun. ACM 22, 11 (Nov. 1979), 594-597.]]
[9]
Postel, J.B. Simple mail transfer protocol. RFC 821, SRI Network Information Center, Aug. 1982.]]
[10]
Proceedings of the virus post-mortem meeting. National Computer Security Center, Ft. George Meade, MD, Nov. 8, 1988.]]
[11]
Reid, B. Lessons from the UNIX breakins at Stanford. Software Engineering Notes 11, 5 (Oct. 1986), 29-35.]]
[12]
Reid, B. Reflections on some recent widespread computer breakins. Commun. ACM 30, 2 (Feb. 1987}, 103-105.]]
[13]
Ritchie, D.M. On the security of UNIX. In UNIX Supplementary Documents. AT&T, 1979.]]
[14]
Royko, M. Here's how to stop computer vandals. Chicago Tribune, (Nov. 6, 1988).]]
[15]
Seeley, D. A tour of the worm. In Proceedings of the 1989 Winter USENIX Conference. USENIX Association, San Diego, Calif., Feb. 1989.]]
[16]
Spafford, E.H. The Internet worm program: An analysis. Computer Communication Review 19, 1 (Jan. 1989). Also issued as Purdue CS technical report TR-CSD-823.]]
[17]
Spafford, E.H. Some musings on ethics and computer breakins. In Proceedings of the Winter USENIX Conference. USENIX Association, San Diego, Calif., Feb. 1989.]]
[18]
Steiner, J., Neuman, C., and Schiller, J. Kerberos: An authentication service for open network systems. In Proceedings of the Winter USENIX Association Conference, Feb. 1988, pp. 191-202.]]
[19]
Uncle Sam's anti-virus corps. UNIX Today!. (Jan. 23, 1989), 1o.]]

Cited By

View all

Recommendations

Reviews

Thomas C. Richards

This paper contains a detailed analysis of the Internet worm incident, which occurred in November 1988. During the evening of November 2 the worm spread quickly to Sun 3 systems and VAX computers running 4 BSD UNIX. As time went on these machines became so loaded that they were unable to continue processing. Within several hours effective methods of stopping the invading program had been discovered. This paper contains a complete analysis of how the Internet worm operated and of the aftermath of its release. This includes how bugs in the fingerd and sendmail software in UNIX were exploited and how the attacker used common lists of passwords until a match was found. A detailed overview of how the worm program functioned is also presented. The author concludes his discussion with the moral, ethical, and legal issues related to this type of computer security breach.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 32, Issue 6
June 1989
92 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/63526
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 1989
Published in CACM Volume 32, Issue 6

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)179
  • Downloads (Last 6 weeks)7
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Ethics governance development: The case of the Menlo ReportSocial Studies of Science10.1177/0306312723115170853:3(315-340)Online publication date: 19-Feb-2023
  • (2023)A Call for Mandatory Input Validation and Fuzz TestingWireless Personal Communications10.1007/s11277-023-10431-2Online publication date: 19-Apr-2023
  • (2022)The Relevance of Classic Fuzz Testing: Have We Solved This One?IEEE Transactions on Software Engineering10.1109/TSE.2020.304776648:6(2028-2039)Online publication date: 1-Jun-2022
  • (2021)A BAS Algorithm Based Neural Network for Intrusion Detection2021 11th International Conference on Intelligent Control and Information Processing (ICICIP)10.1109/ICICIP53388.2021.9642170(22-27)Online publication date: 3-Dec-2021
  • (2021)Connected Subgraph Defense GamesAlgorithmica10.1007/s00453-021-00858-z83:11(3403-3431)Online publication date: 1-Nov-2021
  • (2021)Malicious SoftwareComputer Security and the Internet10.1007/978-3-030-83411-1_7(183-211)Online publication date: 14-Oct-2021
  • (2021)User Authentication—Passwords, Biometrics and AlternativesComputer Security and the Internet10.1007/978-3-030-83411-1_3(55-90)Online publication date: 14-Oct-2021
  • (2020)System-Assigned PasswordsInformatica10.15388/20-INFOR40831:3(459-479)Online publication date: 17-Apr-2020
  • (2020)Trying to do it all in a single course: a surprisingly good idea2020 IEEE/ACM Workshop on Education for High-Performance Computing (EduHPC)10.1109/EduHPC51895.2020.00006(1-11)Online publication date: Nov-2020
  • (2020)Analysis of intrusion detection in cyber attacks using DEEP learning neural networksPeer-to-Peer Networking and Applications10.1007/s12083-020-00999-y14:4(2565-2584)Online publication date: 31-Oct-2020
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media