SlideShare uma empresa Scribd logo
1 de 20
COMPUTER
WORMS
Pondicherry University
By:
SADIQUE
NAYEEM
Worms
 Worms: A worm is a program that uses computer
networks and security holes to replicate itself.
 Scans the network for another machine that has a
specific security hole and copies itself
 Use up computer processing time and network bandwidth
during replication.
 Carry payloads that do considerable damage.
Virus v/s Worm
Virus
• Attaches itself to OS or the
programs
• Need user action to abet their
propagation.
• Damages caused is mostly
local to the machine
• Spread quite slowly
Worm
• Do not Attaches itself to OS
• Self propagates across a network
exploiting security in widely used
services.
• It harms the network and consumes
n/w
bandwidth.
• Spread much more rapidly Ex. SQL
Slammer worm 75,000 victims
within ten minutes.
Mechanism of Operation
CLASSIFICATION
Target discovery
Carrier
Activation
Payloads
I. Target Discovery
 Scanning:
 Scanning entails probing a set of addresses to identify
vulnerable hosts. (Sequential form or Random form)
 Pre- Generated Target Lists
 Externally Generated Target Lists
 An target list maintained on a server (Metaserver)
 Internal Target Lists
 Network-based applications always contain information
about other hosts
 Passive
 Not positively search for victim hosts, it waiting for potential
victims contact and produces no abnormal traffic
 More stealthy
II. Propagation Carriers
 Two basic types
 Positively spread itself machine by machine(Self-
Carried)
 Be carried along with normal communication.
 Second Channel
 Need second communication channel
 Embedded
 Either appending to or replacing normal messages and very
difficult to detect
III. Activation
 Human Activation(slowest worm activation method)
 Try to convince people by using social engineering
techniques
 Indicating urgency, “Attached is an important message for you”
 Using people’s vanity, “Open this message to see who loves
you”
 Human Activity-Based Activation
 Resetting the machine
 Logging in
 Opening a remotely infected file
 Scheduled Process Activation
 Auto-updater programs
 Self Activation(fastest worm activation)
 Attach themselves to running services
IV. Payloads
 A "payload" is code in the worm designed to do more
than spread the worm.
 None/nonfunctional (Morris worms)
 Internet Remote Control (Code Red II)
 Spam-Relays (Sobig.f)
 Internet DOS (Code Red, Yaha)
 Data Collection(target on sensitive data and identity theft)
 Data Damage(erase data)
 Physical-world Damage
 Reflashing the BIOSs
 Destroying the motherboards
Work of Payloads
 Delete files
 Encrypt files
 Send documents via e-mail
 Install a “backdoor” in the infected computer to allow the
creation of a “zombie” computer under control of the worm
author. Networks of such machines are often referred to as
botnets.
Prevalence Table – November
2011
Malware Type %
Autorun Worm 8.08%
Heuristic/generic Worm 5.13%
Conficker/Downadup Worm 2.85%
VB Worm 2.12%
Dorkbot Worm 1.46%
According to VIRUS BULLETIN (www.virusbtn.com)JANUARY 2012
Motivation
 experimental curiosity(Morris worms)
 pride
 extortion and criminal gain
 random protest
 political protest
 terrorism
 Cyber warfare
Morris worms
 Launched on November 2, 1988 from MIT, by Robert Morris.
 Designed to spread on UNIX System.
 6000 computers out of 60000 computers at that time (i.e 10%).
 The U.S. GAO(Government Accountability Office) put the cost of
the damage at $10M–100M.
 He was convicted in the US under the 1986 Computer Fraud and
Abuse Act.
Code Red
 Made huge headlines in 2001.
 It slowed down Internet traffic when it began to replicate itself.
 Worm scanned the Internet for unpatched Windows NT or Windows
2000 servers.
 The Code Red worm had instructions to do three things:
 Replicate itself for the first 20 days of each month
 Replace Web pages featuring the message "Hacked by
Chinese"
 Launch a concerted attack on the White House Web site.
----The U.S. government changed the IP address of
www.whitehouse.gov (198.137.240.91).
Nimda
 The worm was released on September 18, 2001
 the Internet’s most widespread virus/worm within 22 minutes.
 Nimda affected both user workstations (clients) running Windows
95, 98, Me, NT, 2000 or XP and servers running Windows NT and
2000.
 Nimda spread by five different infection vectors:
 via email
 via open network shares
 via browsing of compromised web sites
 via back doors left behind by the "Code Red II" and "sadmind/IIS" worms.
SQL Slammer worm
 Starting on January 25, 2003. It spread rapidly, infecting most of its
75,000 victims within ten minutes.
 Although titled "SQL slammer worm", the program did not use the
SQL language
 It exploited a buffer overflow bug in Microsoft's SQL Server
 Slammer's tiny (376 byte) program.
Sobig.f Worm
 In late 2003, the Sobig.f worm exploited open proxy servers to turn
infected machines into a spam engine.
 The Sobig worm appears as an electronic mail with one of the
following subjects: Re: Approved, Re: Details, Re: My details, Re:
Thank you!, Re: That movie etc.
 It will contain the text: "See the attached file for details” and have
attachments such as application.pif, details.pif, movie0045.pif etc.
 At its peak Sobig.f reportedly accounted for 1 in every 17
messages.
 It produced more than one million copies of itself with in the first 24
hours.
 It was written using the Microsoft Visual C++ compiler.
Prevention
 How can I prevent virus’, trojans, worms and malware fromgetting
onto my system?
 Careful web browsing
 E-mail safety
 Keep protection tools up to date
 Review software being installed
 and monitor your child’s computer usage
Current research Focus
 Modelling: To model Worm propagation
 Scanning Techniques
 Sequential Scanning
 Hit List Based Scanning
 Permutation Scanning
 Preferential Subnet Scanning
 Propagation Mechanisms
 Prevention Techniques
Refrences
1. VIRUS BULLETIN (www.virusbtn.com)JANUARY 2012
2. A Taxonomy of ComputerWorms WO RM’0 3, O cto be r 27 , 20 0 3,
Washing to n, DC, USA.
3. www.vxheavens.com
4. www. wikipe dia. co m
5. www. ho wstuffwo rks. co m
6. NetworkSecurity Essentials -William Stallings

Mais conteúdo relacionado

Mais procurados (20)

Cia security model
Cia security modelCia security model
Cia security model
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Malware
MalwareMalware
Malware
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
What is malware
What is malwareWhat is malware
What is malware
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Malicious
MaliciousMalicious
Malicious
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Anti virus
Anti virusAnti virus
Anti virus
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 

Destaque

Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Digi tek project fiona presentation may 1st
Digi tek project fiona presentation may 1stDigi tek project fiona presentation may 1st
Digi tek project fiona presentation may 1stjemillsunt
 
Hardening firefox, Securizar Mozilla Firefox
Hardening firefox, Securizar Mozilla FirefoxHardening firefox, Securizar Mozilla Firefox
Hardening firefox, Securizar Mozilla FirefoxPrivaciseguridad
 
Razer’s project christine
Razer’s project christineRazer’s project christine
Razer’s project christineBill Hamlin
 

Destaque (20)

Computer worm
Computer wormComputer worm
Computer worm
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Worms
WormsWorms
Worms
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Viruses
VirusesViruses
Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Digi tek project fiona presentation may 1st
Digi tek project fiona presentation may 1stDigi tek project fiona presentation may 1st
Digi tek project fiona presentation may 1st
 
Hardening firefox, Securizar Mozilla Firefox
Hardening firefox, Securizar Mozilla FirefoxHardening firefox, Securizar Mozilla Firefox
Hardening firefox, Securizar Mozilla Firefox
 
Razer’s project christine
Razer’s project christineRazer’s project christine
Razer’s project christine
 
Cyber theft !!!
Cyber theft !!!Cyber theft !!!
Cyber theft !!!
 
All about viruses
All about virusesAll about viruses
All about viruses
 
Piracy
PiracyPiracy
Piracy
 

Semelhante a Computer Worms

Semelhante a Computer Worms (20)

5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Viruses
VirusesViruses
Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malware
MalwareMalware
Malware
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
Computer worm
Computer wormComputer worm
Computer worm
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 

Mais de sadique_ghitm

Organizational Behaviour
Organizational BehaviourOrganizational Behaviour
Organizational Behavioursadique_ghitm
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative sadique_ghitm
 
Pumping lemma for regular language
Pumping lemma for regular languagePumping lemma for regular language
Pumping lemma for regular languagesadique_ghitm
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagramssadique_ghitm
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)sadique_ghitm
 
A Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on EigenfaceA Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on Eigenfacesadique_ghitm
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)sadique_ghitm
 
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...sadique_ghitm
 
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...sadique_ghitm
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approachessadique_ghitm
 
A study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfaceA study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfacesadique_ghitm
 
Design and analysis of a mobile file sharing system for opportunistic networks
Design and analysis of a mobile file sharing system for opportunistic networksDesign and analysis of a mobile file sharing system for opportunistic networks
Design and analysis of a mobile file sharing system for opportunistic networkssadique_ghitm
 
A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionsadique_ghitm
 
A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks sadique_ghitm
 

Mais de sadique_ghitm (17)

Attitude
AttitudeAttitude
Attitude
 
Personality
PersonalityPersonality
Personality
 
Organizational Behaviour
Organizational BehaviourOrganizational Behaviour
Organizational Behaviour
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative
 
Pumping lemma for regular language
Pumping lemma for regular languagePumping lemma for regular language
Pumping lemma for regular language
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagrams
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)
 
A Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on EigenfaceA Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on Eigenface
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)
 
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
 
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approaches
 
A study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfaceA study on face recognition technique based on eigenface
A study on face recognition technique based on eigenface
 
Design and analysis of a mobile file sharing system for opportunistic networks
Design and analysis of a mobile file sharing system for opportunistic networksDesign and analysis of a mobile file sharing system for opportunistic networks
Design and analysis of a mobile file sharing system for opportunistic networks
 
A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryption
 
A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks
 
Holographic Memory
Holographic MemoryHolographic Memory
Holographic Memory
 

Último

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Último (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Computer Worms

  • 2. Worms  Worms: A worm is a program that uses computer networks and security holes to replicate itself.  Scans the network for another machine that has a specific security hole and copies itself  Use up computer processing time and network bandwidth during replication.  Carry payloads that do considerable damage.
  • 3. Virus v/s Worm Virus • Attaches itself to OS or the programs • Need user action to abet their propagation. • Damages caused is mostly local to the machine • Spread quite slowly Worm • Do not Attaches itself to OS • Self propagates across a network exploiting security in widely used services. • It harms the network and consumes n/w bandwidth. • Spread much more rapidly Ex. SQL Slammer worm 75,000 victims within ten minutes.
  • 6. I. Target Discovery  Scanning:  Scanning entails probing a set of addresses to identify vulnerable hosts. (Sequential form or Random form)  Pre- Generated Target Lists  Externally Generated Target Lists  An target list maintained on a server (Metaserver)  Internal Target Lists  Network-based applications always contain information about other hosts  Passive  Not positively search for victim hosts, it waiting for potential victims contact and produces no abnormal traffic  More stealthy
  • 7. II. Propagation Carriers  Two basic types  Positively spread itself machine by machine(Self- Carried)  Be carried along with normal communication.  Second Channel  Need second communication channel  Embedded  Either appending to or replacing normal messages and very difficult to detect
  • 8. III. Activation  Human Activation(slowest worm activation method)  Try to convince people by using social engineering techniques  Indicating urgency, “Attached is an important message for you”  Using people’s vanity, “Open this message to see who loves you”  Human Activity-Based Activation  Resetting the machine  Logging in  Opening a remotely infected file  Scheduled Process Activation  Auto-updater programs  Self Activation(fastest worm activation)  Attach themselves to running services
  • 9. IV. Payloads  A "payload" is code in the worm designed to do more than spread the worm.  None/nonfunctional (Morris worms)  Internet Remote Control (Code Red II)  Spam-Relays (Sobig.f)  Internet DOS (Code Red, Yaha)  Data Collection(target on sensitive data and identity theft)  Data Damage(erase data)  Physical-world Damage  Reflashing the BIOSs  Destroying the motherboards
  • 10. Work of Payloads  Delete files  Encrypt files  Send documents via e-mail  Install a “backdoor” in the infected computer to allow the creation of a “zombie” computer under control of the worm author. Networks of such machines are often referred to as botnets.
  • 11. Prevalence Table – November 2011 Malware Type % Autorun Worm 8.08% Heuristic/generic Worm 5.13% Conficker/Downadup Worm 2.85% VB Worm 2.12% Dorkbot Worm 1.46% According to VIRUS BULLETIN (www.virusbtn.com)JANUARY 2012
  • 12. Motivation  experimental curiosity(Morris worms)  pride  extortion and criminal gain  random protest  political protest  terrorism  Cyber warfare
  • 13. Morris worms  Launched on November 2, 1988 from MIT, by Robert Morris.  Designed to spread on UNIX System.  6000 computers out of 60000 computers at that time (i.e 10%).  The U.S. GAO(Government Accountability Office) put the cost of the damage at $10M–100M.  He was convicted in the US under the 1986 Computer Fraud and Abuse Act.
  • 14. Code Red  Made huge headlines in 2001.  It slowed down Internet traffic when it began to replicate itself.  Worm scanned the Internet for unpatched Windows NT or Windows 2000 servers.  The Code Red worm had instructions to do three things:  Replicate itself for the first 20 days of each month  Replace Web pages featuring the message "Hacked by Chinese"  Launch a concerted attack on the White House Web site. ----The U.S. government changed the IP address of www.whitehouse.gov (198.137.240.91).
  • 15. Nimda  The worm was released on September 18, 2001  the Internet’s most widespread virus/worm within 22 minutes.  Nimda affected both user workstations (clients) running Windows 95, 98, Me, NT, 2000 or XP and servers running Windows NT and 2000.  Nimda spread by five different infection vectors:  via email  via open network shares  via browsing of compromised web sites  via back doors left behind by the "Code Red II" and "sadmind/IIS" worms.
  • 16. SQL Slammer worm  Starting on January 25, 2003. It spread rapidly, infecting most of its 75,000 victims within ten minutes.  Although titled "SQL slammer worm", the program did not use the SQL language  It exploited a buffer overflow bug in Microsoft's SQL Server  Slammer's tiny (376 byte) program.
  • 17. Sobig.f Worm  In late 2003, the Sobig.f worm exploited open proxy servers to turn infected machines into a spam engine.  The Sobig worm appears as an electronic mail with one of the following subjects: Re: Approved, Re: Details, Re: My details, Re: Thank you!, Re: That movie etc.  It will contain the text: "See the attached file for details” and have attachments such as application.pif, details.pif, movie0045.pif etc.  At its peak Sobig.f reportedly accounted for 1 in every 17 messages.  It produced more than one million copies of itself with in the first 24 hours.  It was written using the Microsoft Visual C++ compiler.
  • 18. Prevention  How can I prevent virus’, trojans, worms and malware fromgetting onto my system?  Careful web browsing  E-mail safety  Keep protection tools up to date  Review software being installed  and monitor your child’s computer usage
  • 19. Current research Focus  Modelling: To model Worm propagation  Scanning Techniques  Sequential Scanning  Hit List Based Scanning  Permutation Scanning  Preferential Subnet Scanning  Propagation Mechanisms  Prevention Techniques
  • 20. Refrences 1. VIRUS BULLETIN (www.virusbtn.com)JANUARY 2012 2. A Taxonomy of ComputerWorms WO RM’0 3, O cto be r 27 , 20 0 3, Washing to n, DC, USA. 3. www.vxheavens.com 4. www. wikipe dia. co m 5. www. ho wstuffwo rks. co m 6. NetworkSecurity Essentials -William Stallings