skip to main content
10.1145/1593105.1593200acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article

Detection of networks blocks used by the Storm Worm botnet

Published:28 March 2008Publication History

ABSTRACT

Storm Worm is a prolific web-spread Trojan virus that infects computers and turns them into nodes (called bots) of a botnet. The bots then can be used to distribute spam messages, launch DOS attacks, host phishing web sites, etc. This paper investigated Storm Worm bots that were used to propagate the virus during a four-month period of time. We found certain network blocks, because of their vulnerability, were more likely to contain Storm Worm bots.

References

  1. Collins, M. P., Shimeall, T. J., Faber, S., Janies, J., Weaver, R., Shon. M. and Kadane, J. B. Using uncleanliness to predict future botnet addresses. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. Oct. 2007, San Diego, CA. 93--104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Garretson, C. Storm: the largest botnet in the world? Network World. Sept. 28, 2007. http://www.networkworld.com/news/2007/092707-storm-largest-botnet.htmlGoogle ScholarGoogle Scholar
  3. Grizzard, J., Sharma, V. and Dagon, D. Peer-to-peer botnets: overview and case study. HotBots '07: Workshop on Hot Topics in Understanding Botnets. Apr. 2007, Cambridge, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Krebs, B. Just how bad is the Storm Worm? The Washington Post, October 2007. http://blog.washingtonpost.com/securityfix/2007/10/the_storm_worm_maelstrom_or_te.htmlGoogle ScholarGoogle Scholar
  5. McMillan, R. Storm Worm spews out 15 million pump-and dump messages. Computer World UK. Oct. 31, 2007. http://www.computerworlduk.com/management/security/cybercrime/news/index.cfm?newsid=5943Google ScholarGoogle Scholar
  6. O'Donnell, A. The evolutionary microcosm of stock spam. Security & Privacy Magazine, IEEE. 5, 1 (Jan.-Feb. 2007). 70--75. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ono, K., Kawaishi, I. and Kamon, T. Trend of botnet activities. In Proceedings of the 41st Annual IEEE International Carnahan Conference on Security Technology. Oct. 2007, Ottawa, Canada. 243--249.Google ScholarGoogle ScholarCross RefCross Ref
  8. Symantec. Trojan.peacomm. Jan. 19, 2007. http://www.symantec.com/security_response/writeup.jsp?do cid=2007-011917-1403-99Google ScholarGoogle Scholar
  9. Web Security Labs. Storm worm chronology. Sept. 26, 2007. http://www.websense.com/securitylabs/blog/blog.php?BlogID=14Google ScholarGoogle Scholar

Index Terms

  1. Detection of networks blocks used by the Storm Worm botnet

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ACM-SE 46: Proceedings of the 46th Annual Southeast Regional Conference on XX
        March 2008
        548 pages
        ISBN:9781605581057
        DOI:10.1145/1593105

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 March 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate178of377submissions,47%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader