Digging For Worms, Fishing For Answers

  • Authors:
  • F. Buchholz;T. Daniels;J. Early;R. Gopalakrishna;R. Gorman;B. Kuperman;S. Nystrom;A. Schroll;A. Smith

  • Affiliations:
  • -;-;-;-;-;-;-;-;-

  • Venue:
  • ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

Worms continue to be a leading security threat on the Internet.This paper analyzes several of the more widespreadworms and develops a general life-cycle for them. The life-cycle,from the point of view of the victim host, consistsof four stages: target selection, exploitation, infection, andpropagation. While not all worms fall into this frameworkperfectly, by understanding them in this way, it becomes apparentthat the majority of detection techniques used todayfocus on the first three stages. This paper presents a techniquethat is used in the fourth stage to detect the class ofworms that use a horizontal scan to propagate. An argumentis also made that detection in the fourth stage is aviable, but under-used technique.