请输入您要查询的百科知识:

 

词条 Computer worm
释义

  1. History

  2. Harm

  3. Countermeasures

  4. Worms with good intent

  5. See also

  6. References

  7. External links

{{about|coding of a worm|the data storage device|Write Once Read Many|other uses|worm (disambiguation)}}{{pp-move-indef}}

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.[1] Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Many worms are designed only to spread, and do not attempt to change the systems they pass through. However, as the Morris worm and Mydoom showed, even these "payload-free" worms can cause major disruption by increasing network traffic and other unintended effects.

History

The actual term "worm" was first used in John Brunner's 1975 novel, The Shockwave Rider. In that novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful men who run a national electronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitor it... There's never been a worm with that tough a head or that long a tail!"[2]

On November 2, 1988, Robert Tappan Morris, a Cornell University computer science graduate student, unleashed what became known as the Morris worm, disrupting a large number of computers then on the Internet, guessed at the time to be one tenth of all those connected.[3] During the Morris appeal process, the U.S. Court of Appeals estimated the cost of removing the virus from each installation at between $200 and $53,000; this work prompted the formation of the CERT Coordination Center[4] and Phage mailing list.[5] Morris himself became the first person tried and convicted under the 1986 Computer Fraud and Abuse Act.[6]

Harm

Any code designed to do more than spread the worm is typically referred to as the "payload". Typical malicious payloads might delete files on a host system (e.g., the ExploreZip worm), encrypt files in a ransomware attack, or exfiltrate data such as confidential documents or passwords.

Probably the most common payload for worms is to install a backdoor. This allows the computer to be remotely controlled by the worm author as a "zombie". Networks of such machines are often referred to as botnets and are very commonly used for a range of malicious purposes, including sending spam or performing DoS attacks.[7][8][9][10][11]

Countermeasures

Worms spread by exploiting vulnerabilities in operating systems.

Vendors with security problems supply regular security updates[12] (see "Patch Tuesday"), and if these are installed to a machine then the majority of worms are unable to spread to it. If a vulnerability is disclosed before the security patch released by the vendor, a zero-day attack is possible.

Users need to be wary of opening unexpected email,[13][14] and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick the end-user into running malicious code.

Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days. The use of a firewall is also recommended.

In the April–June 2008 issue of IEEE Transactions on Dependable and Secure Computing, computer scientists described a new and potentially effective way to combat internet worms. The researchers discovered how to contain worms that scanned the Internet randomly, looking for vulnerable hosts to infect. They found that the key was to use software to monitor the number of scans that machines on a network send out. When a machine started to send out too many scans, it was a sign that it has been infected, which allowed administrators to take it off line and check it for malware.[15][16] In addition, machine learning techniques can be used to detect new worms, by analyzing the behavior of the suspected computer.[17]

Users can minimize the threat posed by worms by keeping their computers' operating system and other software up to date, avoiding opening unrecognized or unexpected emails and running firewall and antivirus software.[18]

Mitigation techniques include:

  • ACLs in routers and switches
  • Packet-filters
  • TCP Wrapper/ACL enabled network service daemons
  • Nullroute

Worms with good intent

{{Main article|Helpful worm}}

Beginning with the very first research into worms at Xerox PARC, there have been attempts to create useful worms. Those worms allowed testing by John Shoch and Jon Hupp of the Ethernet principles on their network of Xerox Alto computers. The Nachi family of worms tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system—by exploiting those same vulnerabilities.[19] In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer's owner or user. Regardless of their payload or their writers' intentions, most security experts regard all worms as malware.

Several worms, like XSS worms, have been written to research how worms spread. For example, the effects of changes in social activity or user behavior. One study proposed what seems to be the first computer worm that operates on the second layer of the OSI model (Data link Layer), it utilizes topology information such as Content-addressable memory (CAM) tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered.[20]

See also

  • Botnet
  • Code Shikara (Worm)
  • Computer and network surveillance
  • Computer virus
  • Email spam
  • Self-replicating machine
  • Timeline of computer viruses and worms
  • Trojan horse (computing)
  • XSS worm
  • Zombie (computer science)

References

1. ^{{cite web|last=Barwise|first=Mike|title=What is an internet worm?|url=http://www.bbc.co.uk/webwise/guides/internet-worms|publisher=BBC|accessdate=9 September 2010}}
2. ^{{Cite book |first=John |last=Brunner |title=The Shockwave Rider |location=New York |publisher=Ballantine Books |year=1975 |isbn=978-0-06-010559-4 }}
3. ^{{cite web |url=http://www.paulgraham.com/submarine.html#f4n |title=The Submarine}}
4. ^{{cite web |url=http://www.cert.org/encyc_article/tocencyc.html |title=Security of the Internet |work=CERT/CC |date= }}
5. ^{{cite web |url=http://securitydigest.org/phage/ |title=Phage mailing list |publisher=securitydigest.org}}
6. ^{{cite book |last=Dressler |first=J. |title=Cases and Materials on Criminal Law |chapter=United States v. Morris |location=St. Paul, MN |publisher=Thomson/West |year=2007 |isbn=978-0-314-17719-3 }}
7. ^{{Cite news |url=http://seattletimes.nwsource.com/html/businesstechnology/2001859752_spamdoubles18.html |newspaper=The Seattle Times |title=Business & Technology: E-mail viruses blamed as spam rises sharply |date=February 18, 2004 |first=Tiernan |last=Ray }}
8. ^{{Cite news |url=https://www.wired.com/news/business/0,1367,60747,00.html |title=Cloaking Device Made for Spammers |newspaper=Wired |date=October 9, 2003 |first=Brian |last=McWilliams }}
9. ^{{cite web |url=http://www.channelnewsasia.com/stories/afp_world/view/68810/1/.html |title=Mydoom Internet worm likely from Russia, linked to spam mail: security firm |website=www.channelnewsasia.com |date=31 January 2004 |archive-url=https://web.archive.org/web/20060219193824/http://www.channelnewsasia.com/stories/afp_world/view/68810/1/.html |archive-date=2006-02-19 |deadurl=yes |df= }}
10. ^{{cite web |url= http://www.heise.de/english/newsticker/news/44879 |archiveurl= https://web.archive.org/web/20090528002116/http://www.heise.de/english/newsticker/news/44879 |archivedate= 2009-05-28 |work=Hiese online |title= Uncovered: Trojans as Spam Robots |date= 2004-02-21 |accessdate= 2012-11-02 }}
11. ^{{Cite news |url= http://news.bbc.co.uk/1/hi/technology/3513849.stm |work=BBC News |title= Hacker threats to bookies probed |date= February 23, 2004 }}
12. ^{{cite web|url=http://www.ubuntu.com/usn |title=USN list |publisher=Ubuntu |date= |accessdate=2012-06-10}}
13. ^{{Cite web |url=https://www.f-secure.com/v-descs/iworm.shtml |title=Threat Description Email-Worm |access-date=2018-12-25 |archive-url=https://web.archive.org/web/20180116193554/https://www.f-secure.com/v-descs/iworm.shtml |archive-date=2018-01-16 |dead-url=yes |df= }}
14. ^[https://www.f-secure.com/v-descs/love.shtml Threat Description Email-Worm: VBS/LoveLetter]
15. ^{{Cite journal|url=http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=4509574&arnumber=4358715&count=10&index=3 |last=Sellke |first=S. H. |last2=Shroff |first2=N. B. |last3=Bagchi |first3=S. |year=2008 |title=Modeling and Automated Containment of Worms |journal=IEEE Transactions on Dependable and Secure Computing |volume=5 |issue=2 |pages=71–86 |doi=10.1109/tdsc.2007.70230 |deadurl=yes |archiveurl=https://web.archive.org/web/20150525120335/http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=4509574&arnumber=4358715&count=10&index=3 |archivedate=25 May 2015 }}
16. ^{{Cite news |url=http://newswise.com/articles/view/541456/ |work=Newswise |title=A New Way to Protect Computer Networks from Internet Worms |accessdate=July 5, 2011}}
17. ^Moskovitch R., Elovici Y., Rokach L. (2008), "Detection of unknown computer worms based on behavioral classification of the host", Computational Statistics and Data Analysis, 52(9):4544–4566, {{doi|10.1016/j.csda.2008.01.028}}
18. ^{{cite web |url=http://www.veracode.com/security/computer-worm |title=Computer Worm Information and Removal Steps |publisher=Veracode |accessdate=2015-04-04 |date=2014-02-02 }}
19. ^{{cite web|title=Virus alert about the Nachi worm|url=http://support.microsoft.com/kb/826234|publisher=Microsoft}}
20. ^{{Cite book | doi = 10.1109/ISCC.2010.5546723| chapter = A link-layer-based self-replicating vulnerability discovery agent| title = The IEEE symposium on Computers and Communications| pages = 704| year = 2010| last1 = Al-Salloum | first1 = Z. S. | last2 = Wolthusen | first2 = S. D. | isbn = 978-1-4244-7754-8}}

External links

  • Malware Guide – Guide for understanding, removing and preventing worm infections on Vernalex.com.
  • "The 'Worm' Programs – Early Experience with a Distributed Computation", John Shoch and Jon Hupp, Communications of the ACM, Volume 25 Issue 3 (March 1982), pages 172–180.
  • [https://web.archive.org/web/20160322104740/https://www.nsa.gov/ia/_files/support/WORMPAPER.pdf "The Case for Using Layered Defenses to Stop Worms"], Unclassified report from the U.S. National Security Agency (NSA), 18 June 2004.
  • Worm Evolution{{dead link|date=August 2017 |bot=InternetArchiveBot |fix-attempted=yes }}, paper by Jago Maniscalchi on Digital Threat, 31 May 2009.
{{Malware}}{{Authority control}}{{DEFAULTSORT:Computer Worm}}

3 : Computer worms|Types of malware|Security breaches

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/10 17:07:25