Free Essay

Worms

In:

Submitted By vigi198
Words 2891
Pages 12
ABSTRACT This minor research report is about the computer worm which is a self-navigating malicious program that is being utilized by many attackers to damage the target machine substantially. This report begins by giving an idea of what exactly is computer worm, then we discuss about the mechanism which this malicious code uses to attack the target machine, then we discuss about the various worms which have been discover and design till now, an overview is given about this worm infects the system and the exten to which these worms have cause damage. After that we discuss various prevention tools which are design to detect and eliminate such worms. In the end we discuss about the future potential worms and predicted what kind code will be written and how much damage it can cause to system or network.

INTRODUCTION Everyone, almost everyone and every big organization like bank, pharmaceutical companies, and retail chain companies uses computer these days to do most of the important work so it is understood that their computer will contain certain sensitive information which they do not want to disclose, and as result such kind of information need security, and the term information security was introduced. In this minor research paper we discuss about one malicious code which is a serious threat to such information called WORM. A computer worm is a kind of malicious program which has the capability of reproducing itself and uses computer network to distribute throughout the network, this malicious code unlike virus is independent of other program for the purpose of propagation and infecting the system. It is a kind of malware that most of the time enters the system through the medium of infected e-mail, worms usually hunt for the system with vulnerabilities which they can easily exploit and cause substantial damage to the entire system, once the worms enter the system or any network depending upon the payload which is the code which the author of the worms designs, will destroy the system like some worms will completely corrupt the documents in the system some worms will hinder the performance of the system by utilizing the resources some worms will replicate itself and sends itself to everyone on the contact list of the target machine. This research report discusses the various mechanisms which worm uses to navigate and infect the system, and also this report contains description of various worms detected till now and various tools and system design to prevent them.

MECHANISM In this section we discuss how a worm starts the infection and how it propagates through the machine to multiply the effect of it on the machine. There are certain techniques through which worm discovers its target and infects it, this techniques are discuss below 1. Target locater: If a worm wants to infect any machine. It must first discover if that machine exist. To check the existence of the machine, the worms follow certain techniques. They are a) Scanning: This technique involves searching a set of addresses to identify the vulnerable hosts. The scanning can performed in either of the two ways, they are Sequential scanning in which worms working through an address block using ordered set of addresses and Random scanning in which worms trying to address out of a block in pseudo-random fashion) b) Pre-generated Target Lists: Here an attacker creates a hit list of certain or probable targets, there is chance that this list is created we in advance before the attack begins. There are some scanning techniques like are Stealthy scans, Distributed scanning, DNS searches, Just listen and also there are some public surveys that list such as Netcraft Survey with the help of this worms just see for particular criteria such as the operating system that the machine is running, what the servers are running, what is the version of operating systems etc. c) Internal Target Lists: Many applications include information about the other hosts providing vulnerable services. Such target lists might be used in creation of ’topological’ worms, where worm looks for the local information to hunt new victims by discovering the local communication topology d) Passive: Worms design with this intention does not seek out victim machines. Instead, they either wait for potential victims to contact or rely on user behaviour to hunt for new targets. Even though they are potentially slow these worms produce no uncharacteristic traffic patterns during the target discovery, which makes them dangerous.

2. Infection Propagator: This is an important strategy which worms used in which worms transfer itself to a new node and gets control of it, here this technique is carried out when any worm makes an assumption that the system it has infected has similar characteristic to the system which it transfer itself to. 3. Remote Control and Update Interface: Another vital element of a worm is remote control using a communication module. Without such a module, the worm’s creator does not have control over worm network by broadcasting control messages to copies of worm, such remote control facilitates the attacker in using the worm as a DDoS (distributed denial of service) tool on the zombie network to infect several unknown targets. The attacker can change the behaviour of the worm and even broadcast new infection policy to as many compromised nodes as possible 4. Payload: It is the most important component of worm, it is basically a code which contains script which is designed with an intention of how it will affect the machine. Different attacker will have different payload for their worm depending on their goal and imagination behind designing the worms. Recently it is becoming popular to install an SMTP (Simple Mail Transfer Protocol) spam relay as the payload of a worm

DIFFERENT TYPES OF WORMS 1. E-mail worms: This type of worms have the capability of distributing itself through infected e-mail messages, here e-mails are specially coded to be infected. AN e-mail can have a link which is directed to a certain infected websites which are infected with worm's payload. The worms are activated when a user clicks on the infected link or downloads the infected attachment which contains the worm's payload. When such type of worms spread it generates new e-mail addresses with common names as a result we cannot determine that whether the sender's address is genuine or not. Different ways through which worms are spread include Windows MAPI functions, MS Outlook, direct connection to SMTP servers which has worm’s own SMTP API.

2. Internet worms: This type of worms have capability of scanning network resources which are being utilize by local computers on those networks and look for such type of systems via internet which are vulnerable. The intentions of such kind worms are to gain full access of the vulnerable systems by attacking it. Un-patched systems are also attacked by such kind of worms in which they can easily send request or infected data packets as result of which, worm downloader are installed or the worm itself infects the system.

3. Instant Messaging worms (IM worms): Now days many people communicate and contact their friends through instant messaging application, so attacker concentrates on such application and develops a payload of worm in such a way that it infects the system of the user using this application. Here the attacker broadcast the message in the application and the message contains the link which directs to the website which infected by the worm or an attachment in which contains the worm downloader or the worm itself, if any unsuspected user opens up the message and access the link or attachment his or her system gets infected

4. IRC worms: This is a subtype of instant messaging worms, here the attacker uses chat channels in the messaging application to broadcast infected message containing link to the infected website or an attachment, by downloading which, the user's system gets infected by the worm. 5. File-Sharing Network worms: This worm is also has name called P2P worms. This type worms targets system on which certain file sharing application are running, here the worm in certain shared folder of the application has a file containing payload which will infect the system on its access by the user, the attacker keeps the name of the file in such a way that any unsuspicious user might access it and his or her system gets infected.

6. I-Worm Rays: This computer worms easily transmits and has the capability of being very destructive in nature. This worm is usually in the infected e-mail and it infects the system easily, when any user opens this infected e-mail it spreads through the system rapidly and destroys the whole collection of documents inside the system and also the performance of the system is substantially reduced. The infected e-mail is given either an attractive name or common name so that any unsuspicious user accesses it.

7. Worm Klez: This worm is also known as Klez. This worm back in 2000 infected the operating system of Microsoft through an e-mail. This worm made a security breach in the Microsoft windows through internet explorer application with the aid of IFRAME VULNERABILITY. This worm on opening an e-mail gets into the system infects it and spread through the network to which the system is connected and also it creates a file with a name K which is a windows exe file.

8. I Love You: It is the most famous worm in the history, it was also known as love letter, it affected millions of system in 2000. The distribution of this worm started with an e-mail which contained an attachment which was named I Love You. On downloading the attachment from the e-mail the worm rapidly spreads throughout the system and make unwanted and dangerous modification in it and then makes a duplicate of itself and sends it to all the contacts on the contact list of that user

9. Slammer worms: It was the fastest spreading worm in the history of deliberate software attack, it has also has another name call sapphire. Back in 2003, the distribution begin through internet, infecting almost 90% of vulnerable systems in a span of 15 minutes, causing substantial damage to financial, government, transportation systems. The vulnerabilities which this worm exploited was the two buffer overrun vulnerabilities in SQL server desktop engine and database server of the same, the technique with which these vulnerabilities were exploited were stack overflow and heap overflow techniques. The total size of this worm was 404 bytes and it used to scan the vulnerable system at very high rate and for navigation it used UDP protocol so in single transfer the entire worm was transmitted.

10. Blaster worms: This worm first came in to picture in 2003 was multistage worm which infected nearly half million systems. The vulnerability which this worm exploited was the remote procedure call (RPC) of Microsoft operating system which were Windows 2000 and XP, the technique which this particular worm uses to infect the system is as follows. If the victims TCP connection is opened to 135 port then the payload is sent to this target machine, if the machine is vulnerable the code will run and will have a remote execution from the host which is an attacker and if the XP operating system is unpatched it automatically reboots and the file mblast.exe is stored on the target machine using TFTP protocol.

TOOLS TO PREVENT WORMS FROM ATTACKING THE SYSTEM In this section we discuss about the tools which are used to analyze the vulnerability and configuration of the system of which attacker takes advantage to make the payload of the worm and attack the system accordingly. 1. Kuang: It is a system based on certain rules which discover inconsistencies in the protection modules made by the UNIX system administrators. It helps the manager in making better protection decision using 'what if' protection mechanism. The main intention of kuang is to find the security holes in configuration made for protection by the system manager and not the holes in the operating system. The kuang describes the protection configuration in the unix system from the attacker's perspective, using this method the system performs reverse chaining process to find the vulnerabilities. The liability of the system is not being capable to find the vulnerability at network level.

2. NetKuang: This system is an extension of kuang, having the capability to find the vulnerability at the network level, reason bad protection configuration of the system at network level. Here multiple systems are checked on the network using techniques like parallel and bread first search. The limitation of this system is that it finds only single match in the network, even though there could be multiple paths between privileges of start and end.

3. Noose (Networked Object-Oriented Security Examiner): It is a distributed system, which makes vulnerability analysis on the object modelling based system. It combines the process of host and network based scanning procedure, and the results of such scans are stored in the object classes. It also collects vulnerability analysis data of different programs and presenting it in the form of integrated database, and elaborates how different combination of such vulnerabilities may have effect on the systems. The intelligence of this system is designed in such manner that it immediately installs the missing security patches after the verification of missing security patches.

4. TrendCenter- Predict the next worm: The perspective of TrendCenter is IDS models and 'detect and respond ' models are ineffective in countering worms, and as result it believes in the application of 'predict and prepare' model. The way this model functions is, from many IDEs it aggregates information about the vulnerability and after correlating it all information collected, it predicts what kind of worm any attacker could possibly design or code to exploit such kind of discovered vulnerabilities.

5. Other System: In this section, there are certain standalone and networked tools or systems which are designed to detect vulnerability, effectiveness, integrity of the security configuration of the system, they are COPS(Computer oracle password and security system), SATAN(Security administrator tools for analyzing network), ISS and Nessus which hunt of known vulnerabilities in the system through scanning. System administrator can refer websites like Dshield.org and incidents.org which maintains a list of top 10 vulnerabilities in the system, with the help of which they can fix the bugs in the network. Apart from this, this site also provides information about the possible ip addresses from which the attack could be launch.

Future Worms 1. Warhol worms: Attackers after designing this worm have the capability of gaining information about 10,000 to 50,000 computer systems which have good network connection. When this worm attacks such big network, the author have distributed control over the worms and have the facility of updating the worm payload remotely, and this worm uses hit-list scanning technique.

2. Flash Worms: This worm is an improved version of warhol worms, this worm uses divide and conquer strategy, what it does is the hit list which this worm has, it partitions it into small blocks and then attack each block individually by sending a child worm to each host in the partitioned blocks of the hit list which this worm has, this type of attack is also known as parallel attack, here the child worm starts attacking the host before receiving the entire hit list of host and this increase the parallelism process, this worm on the high bandwidth network can infect any machine on its network within 30 seconds.

3. Stealth worms: This worm in comparison to flash worm distributes itself at measured rate with no suspicious communication pattern because of which it becomes undetectable. The main intentions of such worms without getting detected, attack as many host as possible, such kind of worms create trap door for other high speed worms, plant viruses like Trojan horse which can attack the host machine on getting triggered by the attacker and also place time bombs on to the system which can cause substantial damage to the system when it goes of for which most of the time no recovery is possible.

4. Polymorphic worms: This type of worms are design in such manner that they change their mode of attack or functionality as they navigate to different machines, though there is no precise description of such worms. Here the code of the worm contains an additional module called mutation code because of which the worm changes it functionality on different machines, such type of worm have the capability of reprogramming itself according to the different parameters of the system to discover vulnerabilities in the system.

CONCLUSION This minor research report concludes that computer worm a malicious self replicating program code is a potential threat to information security and even after discussing various dangerous worms detected till now and the various tools and systems design to prevent and eliminate this malicious program. There is still potential for new worm to designed and become a threat to information security

REFRENCES * http://www.it.iitb.ac.in/~shravan/Seminar/report.pdf * http://seclab.cs.ucdavis.edu/papers/Cheetancheri-thesis.pdf * http://computerworm.net/ * http://www.icir.org/vern/papers/taxonomy.pdf

Similar Documents

Free Essay

Mydoom Worm

...Running head: Malicious Code MyDoom Worm Daniel Stevenson 11/22/2013 ITT-Tech North Las Vegas Abstract In this paper I will be detailing the Mydoom worm and what this has done to computer systems as well as what was the steps in how to prevent or remove this hazard from your computer. MyDoom Worm No one wants a virus on their computer, especially when it means that you may be spending money to remove these nasty pests from your system. There are all sorts of things that can infect your computer from viruses, worms, rootkits that make your computer into a puppet and also malicious spam ware and malware. All of these things can wreak havoc on your network. In this paper I will tell you about a worm that still has the record for being the fastest spreading virus. This virus is known as W32.MyDoom@mm. This worm has other names but this is the one that it is most known by. The Beginning MyDoom was a worm that came to the public eye at the beginning of 2004. Finnish security company F-Secure named is the worst virus to date because of the way it quickly infested users emails and quickly attached itself to any email that was going out that had an attachment. When the worm first came into the spotlight F-Secure stated that the worm was on 20-30% of the worldwide internet traffic. Another company that screens emails for companies, MessageLabs, also stated that it had intercepted the worm more than 3.4 million times at a rate of every 1 in 12 emails at its highest. This...

Words: 809 - Pages: 4

Premium Essay

Worms

...Bio 54 2002 Filarial Worms I : Structure, Infection, & Disease Andrew G. Campbell, Ph.D. Parasitic Filarial Worms - Background • Thread-like worms transmitted by insect vectors (flies and mosquitoes) • collectively infect AT LEAST 100 million worldwide • considered major obstacles to development in endemic countries • "major players" – Wuchereria bancrofti / Brugia malayi lymphatic filariasis – Onchocerca volvulus - river blindness – Loa loa - loaiasis 1 Today’s Lecture •Taxonomy •Lymphatic Filariae •Nonlymphatic Filariae •Disease •Diagnosis, Treatment, & Control KINGDOM PHYLUM CLASS ORDER FAMILY GENUS/SPECIES Wuchereria bancrofti Brugia malayi ANIMALIA NEMATODA RHABDITAE SPIRURIDA ONCHOCERCIDAE Onchocerca volvulus Loa loa (Dirofilaria immitis) NONLYMPHATIC LYMPHATIC 2 Lymphatic Filariae • Wuchereria bancrofti – Approximately 600 million individuals are exposed with at least 80 million currently infected. – disease caused often referred to as Bancroftian filariasis. – occurs throughout the tropics, especially in Africa, South America, India, and Southeast Asia – has also been found in parts of Europe, Nile Valley and Australia • Brugia malayi – limited mostly to parts of India and Southeast Asia – infects probably less than 10 million The Global Distribution of Lymphatic Filariasis 3 Major Life Cycle Stages • INFECTIOUS LARVAE - transmitted to humans by mosquito bites • ADULT WORM - develop from larvae, reside in the lymphatic...

Words: 917 - Pages: 4

Premium Essay

Worms

...Bio 54 2002 Filarial Worms I : Structure, Infection, & Disease Andrew G. Campbell, Ph.D. Parasitic Filarial Worms - Background • Thread-like worms transmitted by insect vectors (flies and mosquitoes) • collectively infect AT LEAST 100 million worldwide • considered major obstacles to development in endemic countries • "major players" – Wuchereria bancrofti / Brugia malayi lymphatic filariasis – Onchocerca volvulus - river blindness – Loa loa - loaiasis 1 Today’s Lecture •Taxonomy •Lymphatic Filariae •Nonlymphatic Filariae •Disease •Diagnosis, Treatment, & Control KINGDOM PHYLUM CLASS ORDER FAMILY GENUS/SPECIES Wuchereria bancrofti Brugia malayi ANIMALIA NEMATODA RHABDITAE SPIRURIDA ONCHOCERCIDAE Onchocerca volvulus Loa loa (Dirofilaria immitis) NONLYMPHATIC LYMPHATIC 2 Lymphatic Filariae • Wuchereria bancrofti – Approximately 600 million individuals are exposed with at least 80 million currently infected. – disease caused often referred to as Bancroftian filariasis. – occurs throughout the tropics, especially in Africa, South America, India, and Southeast Asia – has also been found in parts of Europe, Nile Valley and Australia • Brugia malayi – limited mostly to parts of India and Southeast Asia – infects probably less than 10 million The Global Distribution of Lymphatic Filariasis 3 Major Life Cycle Stages • INFECTIOUS LARVAE - transmitted to humans by mosquito bites • ADULT WORM - develop from larvae, reside in the lymphatic...

Words: 917 - Pages: 4

Premium Essay

Worms

...What attracts immigrants to come this country? The Immigration Reform basically focuses on the number of immigrants both legal and illegal that are living in the United States. Immigrants are attracted to this country, because from the 1980’s to the 1990’s Dominique M. Gross and Nicholas Schmitt says that it is shown that the existence of similar cultural communities attracts new immigrants to come to the United States of America. They say that the pulling effect is shown to fall zero for cultural communities above a certain threshold. Many immigrants come to this country, because it is known to be the land of the free which means having more opportunities than what they had back from where they use to live. Immigrants who come either illegal or legal know he or she can find work faster in the U.S. instead of being home. Gross states that the existence of a community of the same origin contributes to the segmentation of the labor market, thereby generating more attractive labor market options for new immigrants. It was said that illegal immigrants who currently live in the United States will be eligible for legal status in eight years, as long as they learned English, didn’t commit a crime and paid their taxes. What is the Impact on the U.S. Economy? James K. Jackson who is the specialist in International Trade and finance foreign Affairs, Defense, and trade Division states that the United States is in the process of negotiating a number of trade agreements...

Words: 1260 - Pages: 6

Premium Essay

Worm

...Case 13-5 Chemical Bank Chemical Bank is a classic case on management control in a commercial bank. One of the key issues is: should branches be set up as profit centers? Discussion: Goals. Although the goals for a branch are described in paragraph 3 of the case, these are probably not a good statement of the goals for the bank as a whole. Although I am sure that the bank as a whole wants to earn satisfactory profits, and to grow in deposits and loans, both of these objectives are really a function of another factor which is an explicit goal of many banks; service to their community. The economic rationale of this high-sounding goal is straightforward; banks make a profit by loaning out the funds entrusted to them by depositors. An increase in loans requires a preceding increase in deposits. But in order to get an increase in deposits, the bank must perform a useful service to businessmen and residents of the community. One of the most important differences between a bank and a manufacturing company are the opportunities for product differentiation. Money is about the most homogeneous product imaginable and, in fact, money is not the bank’s product at all. Its product is service to depositors and borrowers, and it must find imaginative and efficient ways to render better services than its competitors. Organizational structure. Nominally at least, Chemical Bank is decentralized in the operation of its branch banks. Branch managers are told that they are responsible...

Words: 2671 - Pages: 11

Free Essay

Worms

...Purpose: To examine slides of a variety of flatworms and roundworms , living and preserved specimens to see their various structures and features. Introduction: Members of the phylum Platyhelminthes are commonly called flatworms. There are both parasitic and free-living forms of this group. Flatworms, either parasitic or free-living forms, have both sexes on the same individual, which is called hermaphroditic. It is also called monoecious. Some parasitic species will self-fertilize their own eggs if another individual is not present. This group does not have a body cavity and it is called acoelomate. Flatworms are the first animal group to show all three tissue layers that we find in most animals except Sponges and Cnidarians. That is called triploblastic. These three embryonic tissues are: ectoderm, which forms the skin or epidermis and nervous tissue, mesoderm, which forms muscles and some organs, and endoderm, which forms the lining of the gastrovascular cavity or gut. Flatworms are bilaterally symmetrical. The phylum is divided into four classes : Turbellaria - free-living marine, freshwater, and terrestrial flatworms ,Class Trematoda - parasitic internal flukes, Class Cestoda - parasitic tapeworms, Class Monogenea- parasitic external flukes . All roundworms, phylum Nematoda, are very similar in appearance, they have a cylindrical body with tapering ends. Most Nematodes are free-living, but some are important parasites of plants and animals. As for the flatworms...

Words: 289 - Pages: 2

Free Essay

Guinea Worm

...Dracunculiasis the disease commonly known as Guinea Worm is caused by the parasitic worm Dracunculus Medinensis . Guinea Worm disease only occurs in 10% of the world’s poorest populations who has no access to safe drinking water or health care (CDC) . This parasitic worm is the largest of parasites affecting the human’s tissues. The risk for Dracunculiasis varies by ones sex, age, profession, and ethnicity. These differences reflect from how people’s drinking water is obtained in these countries (Medscape). Drancunculiasis is commonly found now in Southern Sudan. About the same number of men and women are equally infected. Guinea Worm is common among the ages of 15–45 years old. People in this age group are known to be farmers, herders, and water fetchers for the household. Water fetchers often affected more due to the fact that they are more likely to drink contaminated water while away from home (CDC). People become infected with Guinea worm by drinking stationary water containing copepods tiny "water fleas" that carry Guinea worm. It takes about 2 weeks to mature inside the copepods before they can infect humans. Measuring 2-3 feet in length the adult female can carry about 3 million embryos within one person (World Health Organization). This parasite migrates through the victim's subcutaneous tissues causing severe pain especially when it occurs in the joints. The worm eventually emerges causing an intense pain, blisters and ulcers accompanied by fever, nausea and vomiting...

Words: 646 - Pages: 3

Free Essay

Pump Parts

...De Montfort University | ENGD1019 -Computer Aided Engineering – Assignment 3 | | P. J. Prickett 3/27/2014 | Solid models of all the components 1 1 The following dimensions have been put into place to ensure that the depth of the ridges are kept the same. Doing this will reduce all forms of likelihood of any abnormalities occuring when the driver worm is connect to the gear. 3 3 Here are the three stages of the creation of the driver worm. A sketch round the x axis of 360 degrees was drawn followed by a mirror bein created by the datum plane for the seep that was to be made. 2 2 The exact same steps were repeated in this stage, the only differences being a few dimensions and a change in the directions of the sweeps. To be more specific the difference in this case between the plane and the sweep was 6, this was to ensure that the heical sweepes were at an eaqual distance from each other in order for the two distances to stay equal when the overall size is changed. Doing this removes the likelhood of any mechanical issues. 5 5 4 4 3 3 2 2 1 1 Each of the 5 parts shown above are all derived from the centre of circles. Because they are each from the same centre circles they all then contain associativity from the same cross section of planes. 4 4 3 3 2 2 1 1 These are the creation and extrudes on the sides of the casing the bottom one is in a fixed position right at the bottom...

Words: 1097 - Pages: 5

Premium Essay

The Worm in the Apple

...The worm in the apple John Cheever is an American novelist, who gained his popularity as a short-story writer, for which he was awarded with Pulitzer prize for fiction. His work mostly deal with the duality oh human nature corroborated by cultural and psychological background. And his short story titled “The worm in the apple” is not an exclusion. The story unfolds very smoothly and evenly in spite of of the stirring and at the same time troubling subject of the matter. We get acquainted with the main characters – The Crutchman family “so very very happy and so temperate in all their habits and so pleased with everything that came their way”, due to the anaphoric repetition the author creates intensification, that states the problem – what in beautiful on the outside may be dreadful inside. Obviously, the theme of the work is reflected in the title of the story. The rhetorical questions (who but someone suffering from a guilt complex would want to much light to pour into the rooms?; Why be o intense about digging holes) give a detailed emotional description of the Crutchman's life. The world of things puts emphasis on their way of life and thoughts. The positive form of these questions presuppose negative answers and so it gets obvious from the very beginning that the Crutchman's problems are deep and that the extraordinary rosiness of their family fruit just conceal the gravity of the infection. John Cheever gives a psychological portray of the main characters: Helen and Larry...

Words: 693 - Pages: 3

Premium Essay

The Worm in the Apple

...The worm in the apple John Cheever is an American novelist, who gained his popularity as a short-story writer, for which he was awarded with Pulitzer prize for fiction. His work mostly deal with the duality oh human nature corroborated by cultural and psychological background. And his short story titled “The worm in the apple” is not an exclusion. The story unfolds very smoothly and evenly in spite of of the stirring and at the same time troubling subject of the matter. We get acquainted with the main characters – The Crutchman family “so very very happy and so temperate in all their habits and so pleased with everything that came their way”, due to the anaphoric repetition the author creates intensification, that states the problem – what in beautiful on the outside may be dreadful inside. Obviously, the theme of the work is reflected in the title of the story. The rhetorical questions (who but someone suffering from a guilt complex would want to much light to pour into the rooms?; Why be o intense about digging holes) give a detailed emotional description of the Crutchman's life. The world of things puts emphasis on their way of life and thoughts. The positive form of these questions presuppose negative answers and so it gets obvious from the very beginning that the Crutchman's problems are deep and that the extraordinary rosiness of their family fruit just conceal the gravity of the infection. John Cheever gives a psychological portray of the main characters: Helen and...

Words: 339 - Pages: 2

Premium Essay

Stuxnet Worm

...STUXNET Worm Webster University SECR-5080 Information Systems Security Author Note Certificate of Authorship: This paper was prepared by me for this specific course and is not a result of plagiarism or self-plagiarism. I have cited all sources from which I used data, ideas, or words either quoted or paraphrased. Abstract Discovered in June of 2010, a computer worm called Stuxnet was designed to attack programmable-logic controllers or PLCs that are used to control switches and values in industries that operate a specific type of on Siemens PLC device using Step7 software running on a Windows operating system. The worm was successful because it was able to exploit a of four zero-day flaw of Windows operating system. Stuxnet was a targeted attack by intelligence agencies to delay the enrichment of uranium by Iran. The Stuxnet worm was the first clear public evidence of sophisticated computer malware to sabotage control systems. The Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges in 2010. Table of Contents Introduction 5 Stuxnet Worm 5 Stuxnet is a Computer Virus 5 How Stuxnet Works 7 Stuxnet and PLCs 9 Stuxnet: Cyber Warfare? 9 Zero-day flaws and Stuxnet 11 Summary 12 References 14 Table of Figures Figure 1: SIEMINS S7 family of PLC (SIEMINS, n.d) 5 Figure 2: Flash Drive 5 Figure 3: Realtek Semiconductor Corp Logo (RealTek, n.d.). 6 Figure 4: Realtek Certificate (Symantec, 2010). 6 Figure 5: How STUXNET...

Words: 2136 - Pages: 9

Free Essay

Guinea Worm

...Dracunculiasis the disease commonly known as Guinea Worm is caused by the parasitic worm Dracunculus Medinensis . Guinea Worm disease only occurs in 10% of the world’s poorest populations who has no access to safe drinking water or health care. This parasitic worm is the largest of parasites affecting the human’s tissues. The risk for Dracunculiasis varies by ones sex, age, profession, and ethnicity. These differences reflect from how people’s drinking water is obtained in these countries. Drancunculiasis is commonly found now in Southern Sudan. About the same number of men and women are equally infected. Guinea Worm is common among the ages of 15–45 years old. People in this age group are known to be farmers, herders, and water fetchers for the household. Water fetchers often affected more due to the fact that they are more likely to drink contaminated water while away from home. People become infected with Guinea worm by drinking stationary water containing copepods tiny "water fleas" that carry Guinea worm. It takes about 2 weeks to mature inside the copepods before they can infect humans. Measuring 2-3 feet in length the adult female can carry about 3 million embryos within one person. This parasite migrates through the victim's subcutaneous tissues causing severe pain especially when it occurs in the joints. The worm eventually emerges causing an intense pain, blisters and ulcers accompanied by fever, nausea and vomiting. Studies show that biological factors can increase...

Words: 255 - Pages: 2

Free Essay

Round Worms

...experiments on more than 10,000 tiny laboratory roundworms. The first step involved developing genetic mutants of these transparent roundworms for each one of 654 genes that were suspected to play a role in the regulation of axon regrowth in worms, fruit flies and mice. They then labeled the roundworm neurons with green fluorescent protein and, with a precise surgical laser, damaged a specific axon. Because the worms were transparent they could see the axons expressing a green fluorescent protein. By examining the re-growth, or lack of growth, of the damaged axon 24 hours later, the scientists were then able to determine which of these 654 genes were actually important to axon re-growth. The 76 genes seen are believed to have the same function in humans as in the worms. Research teams are now collaborating with other investigators to conduct experiments on mice to verify this connection and determine which of these genes are the most critically important. This article is relevant to what I am studying because it show that we as humans have so many genes cells and other parts throughout our body that do many different things and when we damage these or harm them there is a way for our body to compensate or try to fix the problem. So in the worms they are finding axons or nerve cells that could potentially cure nerve damage in our bodies. My opinion is that if scientists can find a way to regenerate nerve cells in animals that maybe someday they will be able to find a way...

Words: 367 - Pages: 2

Free Essay

Worms and Trojan Horses

...The ILOVEYOU worm was first reported in Hong Kong on 4 May 2000 and spread westward on that day. The ILOVEYOU worm affected computers at more than half of the companies in the USA and more than 105 mail servers in Europe. Internal e-mail systems at both the U.S. Senate and Britain's House of Commons were shut down. It was estimated that the ILOVEYOU worm did more damage than any other malicious program in the history of computing: approximately US$ 9 × 109. On 4 May 2000, MessageLabs filtered ILOVEYOU from one in every 28 e-mails, the all-time highest daily infection rate seen by MessageLabs. The ILOVEYOU incident was commonly reported as a virus in the news media, but it was actually a worm, because this malicious program did not infect other programs. I call this worm by the subject line of e-mail that propagated this worm. Norton Anti-Virus calls it VBS.Loveletter.A. The ILOVEYOU worm arrived at the victim's computer in the form of e-mail with the ILOVEYOU subject line and an attachment. The e-mail itself was innocuous, but when the user clicked on the attachment to read the alleged love letter, LOVE-LETTER-FOR-YOU.TXT.VBS, the attachment was a Visual Basic program that performed a horrible sequence of bad things: Deletion of files from victim's hard disk. The worm overwrote files from the victims' hard disk drive, specifically targeting files with extensions:*.JPG, *.GIF, and *.WAV, amongst many others (i.e., files containing audio/visual data), *.CSS (i.e., cascading style...

Words: 1046 - Pages: 5

Premium Essay

Worm Hole

...1. INTRODUCTION 1.1 Overview A mobile ad hoc network or MANET is a kind of wireless ad hoc network, which is the infrastructure wireless networks where each user directly communicates without an access point or base station. It is a self-configuring network of mobile routers connected by wireless links with no access point. Nature of mobile device in a network is autonomous. Due to these mobile devices are free to move. In other words, the mobile ad hoc network is infrastructure less wireless network. The Communication in MANET is take place by using multi-hop paths. Nodes in the MANET share the wireless medium and the network topology changes dynamically. In MANET, breaking of communication link is very frequent because the nodes are free to move to anywhere. The density of nodes and the number of nodes are depends on the applications in which we are using MANET. Fig-1 Ad-Hoc Network In figure a simple ad-hoc network shown with 3 nodes. Node1 and node 3 are not within range of each other; however the node 2 can be used to forward packets between node 1and nodes 2. The node 2 will act as a router and these three nodes together form an ad-hoc network. 1.2 MANET Characteristics Distributed operation: The control of the network is distributed among the nodes; there is no central background for the control of operations. The nodes should cooperate with each other and communicate among themselves...

Words: 3336 - Pages: 14