Worms have become a real threat for computer users for the past few years. Worm is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. It is coming out so fast these days that even the most accurate scanners cannot track all of the new ones. Indeed until now there is no specific way to classify the worm. To understand the threats posed by the worms, this research had been carried out. In this paper the researchers proposed a new way to classify the worms which later is used as the basis to build up a system which is called as the EDOWA system to detect worms attack. Details on how the new worm of classification which is called as EDOWA worm classification is produced are explained in this paper. Hopefully this new worm classification can be used as the basis model to produce a system either to detect or defend organization from worms attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
L. McCarthy, “Own Your Space: Keep Yourself and Your Stuff Safe Online (Book),” Addison-Wesley, Boston, MA, 2006.
C. Nachenberg, “Computer Parasitology,” Proceedings of the Ninth International Virus Bulletin Conference, September/October 1999, pp. 1–25.
J. Nazario, “Defense and Detection Strategies against Internet Worms” (BOOK), Artech House Inc., 2003. Or a paper entitles “The Future of Internet Worm” by Nazario, J., Anderson, J., Wash, R., and Connelly, C. Crimelabs Research, Norwood, USA, 2001.
N. Weaver, V. Paxson, S. Staniford and R. Cunningham, “A Taxonomy of Computer Wor m s,” Proceedings of the ACM CCS Workshop on Rapid Malcode (WORM), pp. 11–18, 2003.
D.M. Kienzle and M.C. Elder, “Recent Worms: A Survey and Trends,” Proceedings of the ACM CCS Workshop on Rapid Malcode (WORM), pp. 1–10, 2003.
D.J. Albanese, M.J. Wiacek, C.M. Salter and J.A. Six, “The Case for Using Layered Defenses to Stop Worms (Report style),” UNCLASSIFIED-NSA Report, pp. 10–22, 2004.
C.C. Zou, D. Towsley and W. Gong, “Email worm modeling and defense,” Computer Communications and Networks, ICCCN 2004, pp. 409–414, 2004.
D. Christoffersen and B.J. Mauland, “Worm Detection Using Honeypots (Thesis or Dissertation style),” Master dissertation, Norwegian University of Science and Technology, June 2006.
H. Berghel, “The Code Red Worm: Malicious software knows no bounds,” Communication of the ACM, vol. 44, no. 12, pp. 15–19, 2001.
CERT. CERT Advisory CA-2002–25 Integer Overflow in XDR Library, http://www. cert.org/advisories/ca-2002–25.html
M. Bailey, E. Cooke, F. Jahanian, D. Watson and J. Nazario, “The Blaster Worm: Then and Now,” IEEE Security & Privacy, vol. 3, no. 4, pp. 26–31, 2005.
C. Shannon and D. Moore, “The Spread of the Witty Worm,” IEEE Security & Privacy, vol. 2, no. 4, pp. 36–50, 2004.
A. Tsow, “Phishing With Consumer Electronics: Malicious Home Routers,” 15th International World Wide Web Conference (WWW2006), Edinburgh, Scotland, May 2006.
C. Kruegel, E. Kirda, D. Mutz, W. Robertson and G. Vigna, “Polymorphic Worm detection using structural information of executables,” 8th International Symposium on Recent Advances in Intrusion Detection (RAID), 2005.
S.G. Cheetancheri, “Modeling a computer worm defense system (Thesis or Dissertation style),” Master dissertation, University of California, 1998.
C. Nachenberg, “The Evolving Virus Threat,” 23rd NISSC Proceedings, Baltimore, Maryland, 2000.
S. Staniford, President of Silicon Defense. “The Worm FAQ: Frequently Asked Questions on Worms and Worm Containment,” The Worm Information Center, 2003
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media B.V
About this chapter
Cite this chapter
Saudi, M.M., Tamil, E.M., Cullen, A.J., Woodward, M.E., Idris, M.Y.I. (2009). Reverse Engineering: EDOWA Worm Analysis and Classification. In: Ao, SI., Gelman, L. (eds) Advances in Electrical Engineering and Computational Science. Lecture Notes in Electrical Engineering, vol 39. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-2311-7_24
Download citation
DOI: https://doi.org/10.1007/978-90-481-2311-7_24
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-2310-0
Online ISBN: 978-90-481-2311-7
eBook Packages: EngineeringEngineering (R0)