Understanding Biological and Computer Worms: Characteristics, Propagation, and Impact
This chapter delves into the definitions, characteristics, and differences between biological and computer worms. Key concepts such as propagation speed, bandwidth consumption, and the historical context of prominent worms like Code Red I and II are explored. The evolution of worm techniques, including methods for scanning vulnerabilities and the role of peer-to-peer networks, is discussed. The text also emphasizes the importance of early detection through initiatives like the CCDC (Computer Crisis Detection Center) and the need for public awareness in combating emerging threats like iPhone worms.
Understanding Biological and Computer Worms: Characteristics, Propagation, and Impact
E N D
Presentation Transcript
CIS 442- Chapter 3 Worms
Worms • Biological and computer worms • Definition, main characteristics • Differences from Viruses • Bandwidth consumption and speed of propagation • DOS attack
Code Red I • History of first Worm • Vulnerability : IIS • Payload or Damage • Nature of access • Propagation
Speed of Propagation • Challenge of accessing a large number of computers based on their IP addresses • Searching all computers for those that have the exposed vulnerability
Code Red II • Differences or enhancements in comparison with Code Red I: vulnerability, payload, etc. • Nimda as an extension to Code Red II
Worming techniques • How worms search for vulnerabilities ? • How worms find computers that have exposed vulnerabilities ? • SYN packets • Hit list scanning • Methods to prepare initial candidate lists of IP addresses to scan.
Permutation scanning • Permutation: writing a program to scan all possible combinations • Use many computers to optimize scanning and reduce the time to complete scanning the entire IP addresses table. • Topological scanning • Flash worms • Contagion
Peer to Peer networks • P2P system architecture characteristics • Relation with worms • Applications and websites using P2P. • Reasons why P2P are good to spread worms through.
Worms communications • Passive and active worms • Proposing a CCDC: Internet emergency center • Reasons to have CCDC. • Identifying outbreaks.
CCDC-Analyzing new worms. • How experts discover worms ? • How they find ways to counter attack them? • Time challenge ? Find worms quickly before they spread, find ways to treat from worms. • Anticipating new threats • Public involvement
Internet worm • Worm guessing passwords • Methods for good selection of passwords and bad selections of passwords • Iphone worms