skip to main content
article
Free Access

With microscope and tweezers: the worm from MIT's perspective

Published:01 June 1989Publication History
Skip Abstract Section

Abstract

The actions taken by a group of computer scientists at MIT during the worm invasion represents a study of human response to a crisis. The authors also relate the experiences and reactions of other groups throughout the country, especially in terms of how they interacted with the MIT team.

References

  1. 1 Castro, L., et al. Post mortem of 3 November ARPANET/MILNET attack. National Computer Security Center, Ft. Meade, Md., November 1988.]]Google ScholarGoogle Scholar
  2. 2 Computer whiz puts virus in computers. Boston Herald (Nov. 5, 1988), 1.]]Google ScholarGoogle Scholar
  3. 3 Markoff, J. "Author of computer 'virus' is son of U.S. electronic security expert." New York Times {Nov. 5, 1988), A1.]]Google ScholarGoogle Scholar
  4. 4 Markoff, J. Computer snarl: A "back door" ajar. New York Times (Nov. 7, 1988), B10.]]Google ScholarGoogle Scholar
  5. 5 Markoff, J. U.S. is moving to restrict access to facts about computer virus. New York Times (Nov. 11, 1988), A28.]]Google ScholarGoogle Scholar
  6. 6 Neumann, P.G. ed. Forum of risks to the public in cornputers and related systems. 7, 69. ACM Committee on Computers and Public Policy, November 3, 1988.]]Google ScholarGoogle Scholar
  7. 7 Postel, J.B. Simple mail transfer protocol. Request Fo~ Comments NIC/RFC 821. Network Working Group, USC ISI, August 1982.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 Spafford, E.H. The internet worm program: An analy,;is. ACM SIGCOM 19 (Jan. 1989).]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. With microscope and tweezers: the worm from MIT's perspective

      Recommendations

      Reviews

      S. P. Saraswat

      This paper describes a succession of events leading to the discovery and subsequent neutralization of a computer virus at MIT. This virus, known as the Internet virus, originated at Cornell and infected many Internet sites, including MIT, Stanford, and the Rand Corporation, in a short time during October–November 1988. In the initial phases of the attack, several suspicious network messages received at the MIT Media Lab were ignored, but when these messages were repeated on Project Athena computers, the presence of a virus was suspected and action taken to prevent its spread to other sites. Telecommunications experts at MIT contacted other Internet sites to determine the nature of the virus and later decoded the virus to understand its functioning. This cooperation among the users, in the form of an “old boy” network, was very useful in neutralizing the virus. As general points of interest for network security, the paper emphasizes the importance of host-level defenses against network viruses, constant logging of network messages, and a policy of least privilege for access to the network. Although the paper is descriptive and at times difficult to read due to cryptic messages, it is well organized and addresses an issue of great topical interest in an increasingly interconnected global computer environment. MIT's experience will be extremely helpful to telecommunications managers elsewhere in determining appropriate network security policies.

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 32, Issue 6
        June 1989
        92 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/63526
        Issue’s Table of Contents

        Copyright © 1989 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 June 1989

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader