Abstract
The actions taken by a group of computer scientists at MIT during the worm invasion represents a study of human response to a crisis. The authors also relate the experiences and reactions of other groups throughout the country, especially in terms of how they interacted with the MIT team.
- 1 Castro, L., et al. Post mortem of 3 November ARPANET/MILNET attack. National Computer Security Center, Ft. Meade, Md., November 1988.]]Google Scholar
- 2 Computer whiz puts virus in computers. Boston Herald (Nov. 5, 1988), 1.]]Google Scholar
- 3 Markoff, J. "Author of computer 'virus' is son of U.S. electronic security expert." New York Times {Nov. 5, 1988), A1.]]Google Scholar
- 4 Markoff, J. Computer snarl: A "back door" ajar. New York Times (Nov. 7, 1988), B10.]]Google Scholar
- 5 Markoff, J. U.S. is moving to restrict access to facts about computer virus. New York Times (Nov. 11, 1988), A28.]]Google Scholar
- 6 Neumann, P.G. ed. Forum of risks to the public in cornputers and related systems. 7, 69. ACM Committee on Computers and Public Policy, November 3, 1988.]]Google Scholar
- 7 Postel, J.B. Simple mail transfer protocol. Request Fo~ Comments NIC/RFC 821. Network Working Group, USC ISI, August 1982.]] Google ScholarDigital Library
- 8 Spafford, E.H. The internet worm program: An analy,;is. ACM SIGCOM 19 (Jan. 1989).]] Google ScholarDigital Library
Index Terms
- With microscope and tweezers: the worm from MIT's perspective
Recommendations
WORM vs. WORM: preliminary study of an active counter-attack mechanism
WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcodeSelf-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combined with security measures that inadequately scale, worms will continue to ...
Worm virulence estimation for the containment of local worm outbreak
A worm-infected host scanning globally may not cause any new infection in its underlying local network before it is detected and quarantined by a worm detector. To defend this type of scanning hosts, a number of worm scanner detection methods such as ...
Comments