SlideShare ist ein Scribd-Unternehmen logo
1 von 20
COMPUTER
WORMS
Pondicherry University
By:
SADIQUE
NAYEEM
Worms
 Worms: A worm is a program that uses computer
networks and security holes to replicate itself.
 Scans the network for another machine that has a
specific security hole and copies itself
 Use up computer processing time and network bandwidth
during replication.
 Carry payloads that do considerable damage.
Virus v/s Worm
Virus
• Attaches itself to OS or the
programs
• Need user action to abet their
propagation.
• Damages caused is mostly
local to the machine
• Spread quite slowly
Worm
• Do not Attaches itself to OS
• Self propagates across a network
exploiting security in widely used
services.
• It harms the network and consumes
n/w
bandwidth.
• Spread much more rapidly Ex. SQL
Slammer worm 75,000 victims
within ten minutes.
Mechanism of Operation
CLASSIFICATION
Target discovery
Carrier
Activation
Payloads
I. Target Discovery
 Scanning:
 Scanning entails probing a set of addresses to identify
vulnerable hosts. (Sequential form or Random form)
 Pre- Generated Target Lists
 Externally Generated Target Lists
 An target list maintained on a server (Metaserver)
 Internal Target Lists
 Network-based applications always contain information
about other hosts
 Passive
 Not positively search for victim hosts, it waiting for potential
victims contact and produces no abnormal traffic
 More stealthy
II. Propagation Carriers
 Two basic types
 Positively spread itself machine by machine(Self-
Carried)
 Be carried along with normal communication.
 Second Channel
 Need second communication channel
 Embedded
 Either appending to or replacing normal messages and very
difficult to detect
III. Activation
 Human Activation(slowest worm activation method)
 Try to convince people by using social engineering
techniques
 Indicating urgency, “Attached is an important message for you”
 Using people’s vanity, “Open this message to see who loves
you”
 Human Activity-Based Activation
 Resetting the machine
 Logging in
 Opening a remotely infected file
 Scheduled Process Activation
 Auto-updater programs
 Self Activation(fastest worm activation)
 Attach themselves to running services
IV. Payloads
 A "payload" is code in the worm designed to do more
than spread the worm.
 None/nonfunctional (Morris worms)
 Internet Remote Control (Code Red II)
 Spam-Relays (Sobig.f)
 Internet DOS (Code Red, Yaha)
 Data Collection(target on sensitive data and identity theft)
 Data Damage(erase data)
 Physical-world Damage
 Reflashing the BIOSs
 Destroying the motherboards
Work of Payloads
 Delete files
 Encrypt files
 Send documents via e-mail
 Install a “backdoor” in the infected computer to allow the
creation of a “zombie” computer under control of the worm
author. Networks of such machines are often referred to as
botnets.
Prevalence Table – November
2011
Malware Type %
Autorun Worm 8.08%
Heuristic/generic Worm 5.13%
Conficker/Downadup Worm 2.85%
VB Worm 2.12%
Dorkbot Worm 1.46%
According to VIRUS BULLETIN (www.virusbtn.com)JANUARY 2012
Motivation
 experimental curiosity(Morris worms)
 pride
 extortion and criminal gain
 random protest
 political protest
 terrorism
 Cyber warfare
Morris worms
 Launched on November 2, 1988 from MIT, by Robert Morris.
 Designed to spread on UNIX System.
 6000 computers out of 60000 computers at that time (i.e 10%).
 The U.S. GAO(Government Accountability Office) put the cost of
the damage at $10M–100M.
 He was convicted in the US under the 1986 Computer Fraud and
Abuse Act.
Code Red
 Made huge headlines in 2001.
 It slowed down Internet traffic when it began to replicate itself.
 Worm scanned the Internet for unpatched Windows NT or Windows
2000 servers.
 The Code Red worm had instructions to do three things:
 Replicate itself for the first 20 days of each month
 Replace Web pages featuring the message "Hacked by
Chinese"
 Launch a concerted attack on the White House Web site.
----The U.S. government changed the IP address of
www.whitehouse.gov (198.137.240.91).
Nimda
 The worm was released on September 18, 2001
 the Internet’s most widespread virus/worm within 22 minutes.
 Nimda affected both user workstations (clients) running Windows
95, 98, Me, NT, 2000 or XP and servers running Windows NT and
2000.
 Nimda spread by five different infection vectors:
 via email
 via open network shares
 via browsing of compromised web sites
 via back doors left behind by the "Code Red II" and "sadmind/IIS" worms.
SQL Slammer worm
 Starting on January 25, 2003. It spread rapidly, infecting most of its
75,000 victims within ten minutes.
 Although titled "SQL slammer worm", the program did not use the
SQL language
 It exploited a buffer overflow bug in Microsoft's SQL Server
 Slammer's tiny (376 byte) program.
Sobig.f Worm
 In late 2003, the Sobig.f worm exploited open proxy servers to turn
infected machines into a spam engine.
 The Sobig worm appears as an electronic mail with one of the
following subjects: Re: Approved, Re: Details, Re: My details, Re:
Thank you!, Re: That movie etc.
 It will contain the text: "See the attached file for details” and have
attachments such as application.pif, details.pif, movie0045.pif etc.
 At its peak Sobig.f reportedly accounted for 1 in every 17
messages.
 It produced more than one million copies of itself with in the first 24
hours.
 It was written using the Microsoft Visual C++ compiler.
Prevention
 How can I prevent virus’, trojans, worms and malware fromgetting
onto my system?
 Careful web browsing
 E-mail safety
 Keep protection tools up to date
 Review software being installed
 and monitor your child’s computer usage
Current research Focus
 Modelling: To model Worm propagation
 Scanning Techniques
 Sequential Scanning
 Hit List Based Scanning
 Permutation Scanning
 Preferential Subnet Scanning
 Propagation Mechanisms
 Prevention Techniques
Refrences
1. VIRUS BULLETIN (www.virusbtn.com)JANUARY 2012
2. A Taxonomy of ComputerWorms WO RM’0 3, O cto be r 27 , 20 0 3,
Washing to n, DC, USA.
3. www.vxheavens.com
4. www. wikipe dia. co m
5. www. ho wstuffwo rks. co m
6. NetworkSecurity Essentials -William Stallings

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cia security model
Cia security modelCia security model
Cia security model
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Malware
MalwareMalware
Malware
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
What is malware
What is malwareWhat is malware
What is malware
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Malicious
MaliciousMalicious
Malicious
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Anti virus
Anti virusAnti virus
Anti virus
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 

Andere mochten auch

Computer worm
Computer wormComputer worm
Computer worm
zelkan19
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
kmtschida
 
Digi tek project fiona presentation may 1st
Digi tek project fiona presentation may 1stDigi tek project fiona presentation may 1st
Digi tek project fiona presentation may 1st
jemillsunt
 
Razer’s project christine
Razer’s project christineRazer’s project christine
Razer’s project christine
Bill Hamlin
 

Andere mochten auch (20)

Computer worm
Computer wormComputer worm
Computer worm
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Worms
WormsWorms
Worms
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Viruses
VirusesViruses
Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Digi tek project fiona presentation may 1st
Digi tek project fiona presentation may 1stDigi tek project fiona presentation may 1st
Digi tek project fiona presentation may 1st
 
Hardening firefox, Securizar Mozilla Firefox
Hardening firefox, Securizar Mozilla FirefoxHardening firefox, Securizar Mozilla Firefox
Hardening firefox, Securizar Mozilla Firefox
 
Razer’s project christine
Razer’s project christineRazer’s project christine
Razer’s project christine
 
Cyber theft !!!
Cyber theft !!!Cyber theft !!!
Cyber theft !!!
 
All about viruses
All about virusesAll about viruses
All about viruses
 
Piracy
PiracyPiracy
Piracy
 

Ähnlich wie Computer Worms

5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
drewz lin
 
Computer worm
Computer wormComputer worm
Computer worm
zelkan19
 

Ähnlich wie Computer Worms (20)

5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Viruses
VirusesViruses
Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malware
MalwareMalware
Malware
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
Computer worm
Computer wormComputer worm
Computer worm
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 

Mehr von sadique_ghitm

Mehr von sadique_ghitm (17)

Attitude
AttitudeAttitude
Attitude
 
Personality
PersonalityPersonality
Personality
 
Organizational Behaviour
Organizational BehaviourOrganizational Behaviour
Organizational Behaviour
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative
 
Pumping lemma for regular language
Pumping lemma for regular languagePumping lemma for regular language
Pumping lemma for regular language
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagrams
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)
 
A Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on EigenfaceA Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on Eigenface
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)
 
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
 
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approaches
 
A study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfaceA study on face recognition technique based on eigenface
A study on face recognition technique based on eigenface
 
Design and analysis of a mobile file sharing system for opportunistic networks
Design and analysis of a mobile file sharing system for opportunistic networksDesign and analysis of a mobile file sharing system for opportunistic networks
Design and analysis of a mobile file sharing system for opportunistic networks
 
A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryption
 
A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks
 
Holographic Memory
Holographic MemoryHolographic Memory
Holographic Memory
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Computer Worms

  • 2. Worms  Worms: A worm is a program that uses computer networks and security holes to replicate itself.  Scans the network for another machine that has a specific security hole and copies itself  Use up computer processing time and network bandwidth during replication.  Carry payloads that do considerable damage.
  • 3. Virus v/s Worm Virus • Attaches itself to OS or the programs • Need user action to abet their propagation. • Damages caused is mostly local to the machine • Spread quite slowly Worm • Do not Attaches itself to OS • Self propagates across a network exploiting security in widely used services. • It harms the network and consumes n/w bandwidth. • Spread much more rapidly Ex. SQL Slammer worm 75,000 victims within ten minutes.
  • 6. I. Target Discovery  Scanning:  Scanning entails probing a set of addresses to identify vulnerable hosts. (Sequential form or Random form)  Pre- Generated Target Lists  Externally Generated Target Lists  An target list maintained on a server (Metaserver)  Internal Target Lists  Network-based applications always contain information about other hosts  Passive  Not positively search for victim hosts, it waiting for potential victims contact and produces no abnormal traffic  More stealthy
  • 7. II. Propagation Carriers  Two basic types  Positively spread itself machine by machine(Self- Carried)  Be carried along with normal communication.  Second Channel  Need second communication channel  Embedded  Either appending to or replacing normal messages and very difficult to detect
  • 8. III. Activation  Human Activation(slowest worm activation method)  Try to convince people by using social engineering techniques  Indicating urgency, “Attached is an important message for you”  Using people’s vanity, “Open this message to see who loves you”  Human Activity-Based Activation  Resetting the machine  Logging in  Opening a remotely infected file  Scheduled Process Activation  Auto-updater programs  Self Activation(fastest worm activation)  Attach themselves to running services
  • 9. IV. Payloads  A "payload" is code in the worm designed to do more than spread the worm.  None/nonfunctional (Morris worms)  Internet Remote Control (Code Red II)  Spam-Relays (Sobig.f)  Internet DOS (Code Red, Yaha)  Data Collection(target on sensitive data and identity theft)  Data Damage(erase data)  Physical-world Damage  Reflashing the BIOSs  Destroying the motherboards
  • 10. Work of Payloads  Delete files  Encrypt files  Send documents via e-mail  Install a “backdoor” in the infected computer to allow the creation of a “zombie” computer under control of the worm author. Networks of such machines are often referred to as botnets.
  • 11. Prevalence Table – November 2011 Malware Type % Autorun Worm 8.08% Heuristic/generic Worm 5.13% Conficker/Downadup Worm 2.85% VB Worm 2.12% Dorkbot Worm 1.46% According to VIRUS BULLETIN (www.virusbtn.com)JANUARY 2012
  • 12. Motivation  experimental curiosity(Morris worms)  pride  extortion and criminal gain  random protest  political protest  terrorism  Cyber warfare
  • 13. Morris worms  Launched on November 2, 1988 from MIT, by Robert Morris.  Designed to spread on UNIX System.  6000 computers out of 60000 computers at that time (i.e 10%).  The U.S. GAO(Government Accountability Office) put the cost of the damage at $10M–100M.  He was convicted in the US under the 1986 Computer Fraud and Abuse Act.
  • 14. Code Red  Made huge headlines in 2001.  It slowed down Internet traffic when it began to replicate itself.  Worm scanned the Internet for unpatched Windows NT or Windows 2000 servers.  The Code Red worm had instructions to do three things:  Replicate itself for the first 20 days of each month  Replace Web pages featuring the message "Hacked by Chinese"  Launch a concerted attack on the White House Web site. ----The U.S. government changed the IP address of www.whitehouse.gov (198.137.240.91).
  • 15. Nimda  The worm was released on September 18, 2001  the Internet’s most widespread virus/worm within 22 minutes.  Nimda affected both user workstations (clients) running Windows 95, 98, Me, NT, 2000 or XP and servers running Windows NT and 2000.  Nimda spread by five different infection vectors:  via email  via open network shares  via browsing of compromised web sites  via back doors left behind by the "Code Red II" and "sadmind/IIS" worms.
  • 16. SQL Slammer worm  Starting on January 25, 2003. It spread rapidly, infecting most of its 75,000 victims within ten minutes.  Although titled "SQL slammer worm", the program did not use the SQL language  It exploited a buffer overflow bug in Microsoft's SQL Server  Slammer's tiny (376 byte) program.
  • 17. Sobig.f Worm  In late 2003, the Sobig.f worm exploited open proxy servers to turn infected machines into a spam engine.  The Sobig worm appears as an electronic mail with one of the following subjects: Re: Approved, Re: Details, Re: My details, Re: Thank you!, Re: That movie etc.  It will contain the text: "See the attached file for details” and have attachments such as application.pif, details.pif, movie0045.pif etc.  At its peak Sobig.f reportedly accounted for 1 in every 17 messages.  It produced more than one million copies of itself with in the first 24 hours.  It was written using the Microsoft Visual C++ compiler.
  • 18. Prevention  How can I prevent virus’, trojans, worms and malware fromgetting onto my system?  Careful web browsing  E-mail safety  Keep protection tools up to date  Review software being installed  and monitor your child’s computer usage
  • 19. Current research Focus  Modelling: To model Worm propagation  Scanning Techniques  Sequential Scanning  Hit List Based Scanning  Permutation Scanning  Preferential Subnet Scanning  Propagation Mechanisms  Prevention Techniques
  • 20. Refrences 1. VIRUS BULLETIN (www.virusbtn.com)JANUARY 2012 2. A Taxonomy of ComputerWorms WO RM’0 3, O cto be r 27 , 20 0 3, Washing to n, DC, USA. 3. www.vxheavens.com 4. www. wikipe dia. co m 5. www. ho wstuffwo rks. co m 6. NetworkSecurity Essentials -William Stallings