Concept, Characteristics and Defending Mechanism of Worms

Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types- Internet worms, P2P worms, email wo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEICE Transactions on Information and Systems 2009/05/01, Vol.E92.D(5), pp.799-809
Hauptverfasser: TANG, Yong, LUO, Jiaqing, XIAO, Bin, WEI, Guiyi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 809
container_issue 5
container_start_page 799
container_title IEICE Transactions on Information and Systems
container_volume E92.D
creator TANG, Yong
LUO, Jiaqing
XIAO, Bin
WEI, Guiyi
description Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types- Internet worms, P2P worms, email worms and IM (Instant Messaging) worms, based on the space in which a worm finds a victim target. The Internet worm is the focus of this article. We identify the characteristics of Internet worms in terms of their target finding strategy, propagation method and anti-detection capability. Then, we explore state-of-the-art worm detection and worm containment schemes. This article also briefly presents the characteristics, defense methods and related research work of P2P worms, email worms and IM worms. Nowadays, defense against worms remains largely an open problem. In the end of this article, we outline some future directions on the worm research.
doi_str_mv 10.1587/transinf.E92.D.799
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_889410131</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>889410131</sourcerecordid><originalsourceid>FETCH-LOGICAL-c557t-35ee6985a8c0a698fb24677e8a25e0cce99044e9937f1f20df56025d8992b1153</originalsourceid><addsrcrecordid>eNpdkD1PwzAURS0EEqXwB5iysZDg58SJPaK05UNFLCBGy3We21SJU-x04N9jVOjA8u4b7rnDIeQaaAZcVHej1y60zmZzybJZVkl5QiZQFTyFvIRTMqESylTwnJ2TixC2lIJgwCdE1oMzuBtvk3qjvTYj-jaMrQmJdk0yQ4uuad06eUGz0a4NfTLY5GPwfbgkZ1Z3Aa9-c0reF_O3-jFdvj481ffL1HBejWnOEUspuBaG6vjYFSvKqkKhGUdqDEpJiyLevLJgGW0sLynjjZCSrQB4PiU3h92dHz73GEbVt8Fg12mHwz4oIWQBFHKITXZoGj-E4NGqnW977b8UUPWjSf1pUlGTmqmoKULPB2gbRr3GI6J9tNDhf4QfM8LHUnTjFbr8Gwsud-g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>889410131</pqid></control><display><type>article</type><title>Concept, Characteristics and Defending Mechanism of Worms</title><source>J-STAGE (Japan Science &amp; Technology Information Aggregator, Electronic) Freely Available Titles - Japanese</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>TANG, Yong ; LUO, Jiaqing ; XIAO, Bin ; WEI, Guiyi</creator><creatorcontrib>TANG, Yong ; LUO, Jiaqing ; XIAO, Bin ; WEI, Guiyi</creatorcontrib><description>Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types- Internet worms, P2P worms, email worms and IM (Instant Messaging) worms, based on the space in which a worm finds a victim target. The Internet worm is the focus of this article. We identify the characteristics of Internet worms in terms of their target finding strategy, propagation method and anti-detection capability. Then, we explore state-of-the-art worm detection and worm containment schemes. This article also briefly presents the characteristics, defense methods and related research work of P2P worms, email worms and IM worms. Nowadays, defense against worms remains largely an open problem. In the end of this article, we outline some future directions on the worm research.</description><identifier>ISSN: 0916-8532</identifier><identifier>ISSN: 1745-1361</identifier><identifier>EISSN: 1745-1361</identifier><identifier>DOI: 10.1587/transinf.E92.D.799</identifier><language>eng</language><publisher>The Institute of Electronics, Information and Communication Engineers</publisher><subject>Classification ; Containment ; Electronic mail ; Email ; Email worm ; IM worm ; Internet ; Internet worms ; P2P worm ; State of the art ; Strategy ; worm containment ; worm detection ; Worms</subject><ispartof>IEICE Transactions on Information and Systems, 2009/05/01, Vol.E92.D(5), pp.799-809</ispartof><rights>2009 The Institute of Electronics, Information and Communication Engineers</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c557t-35ee6985a8c0a698fb24677e8a25e0cce99044e9937f1f20df56025d8992b1153</citedby><cites>FETCH-LOGICAL-c557t-35ee6985a8c0a698fb24677e8a25e0cce99044e9937f1f20df56025d8992b1153</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,1877,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>TANG, Yong</creatorcontrib><creatorcontrib>LUO, Jiaqing</creatorcontrib><creatorcontrib>XIAO, Bin</creatorcontrib><creatorcontrib>WEI, Guiyi</creatorcontrib><title>Concept, Characteristics and Defending Mechanism of Worms</title><title>IEICE Transactions on Information and Systems</title><addtitle>IEICE Trans. Inf. &amp; Syst.</addtitle><description>Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types- Internet worms, P2P worms, email worms and IM (Instant Messaging) worms, based on the space in which a worm finds a victim target. The Internet worm is the focus of this article. We identify the characteristics of Internet worms in terms of their target finding strategy, propagation method and anti-detection capability. Then, we explore state-of-the-art worm detection and worm containment schemes. This article also briefly presents the characteristics, defense methods and related research work of P2P worms, email worms and IM worms. Nowadays, defense against worms remains largely an open problem. In the end of this article, we outline some future directions on the worm research.</description><subject>Classification</subject><subject>Containment</subject><subject>Electronic mail</subject><subject>Email</subject><subject>Email worm</subject><subject>IM worm</subject><subject>Internet</subject><subject>Internet worms</subject><subject>P2P worm</subject><subject>State of the art</subject><subject>Strategy</subject><subject>worm containment</subject><subject>worm detection</subject><subject>Worms</subject><issn>0916-8532</issn><issn>1745-1361</issn><issn>1745-1361</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><recordid>eNpdkD1PwzAURS0EEqXwB5iysZDg58SJPaK05UNFLCBGy3We21SJU-x04N9jVOjA8u4b7rnDIeQaaAZcVHej1y60zmZzybJZVkl5QiZQFTyFvIRTMqESylTwnJ2TixC2lIJgwCdE1oMzuBtvk3qjvTYj-jaMrQmJdk0yQ4uuad06eUGz0a4NfTLY5GPwfbgkZ1Z3Aa9-c0reF_O3-jFdvj481ffL1HBejWnOEUspuBaG6vjYFSvKqkKhGUdqDEpJiyLevLJgGW0sLynjjZCSrQB4PiU3h92dHz73GEbVt8Fg12mHwz4oIWQBFHKITXZoGj-E4NGqnW977b8UUPWjSf1pUlGTmqmoKULPB2gbRr3GI6J9tNDhf4QfM8LHUnTjFbr8Gwsud-g</recordid><startdate>2009</startdate><enddate>2009</enddate><creator>TANG, Yong</creator><creator>LUO, Jiaqing</creator><creator>XIAO, Bin</creator><creator>WEI, Guiyi</creator><general>The Institute of Electronics, Information and Communication Engineers</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2009</creationdate><title>Concept, Characteristics and Defending Mechanism of Worms</title><author>TANG, Yong ; LUO, Jiaqing ; XIAO, Bin ; WEI, Guiyi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c557t-35ee6985a8c0a698fb24677e8a25e0cce99044e9937f1f20df56025d8992b1153</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Classification</topic><topic>Containment</topic><topic>Electronic mail</topic><topic>Email</topic><topic>Email worm</topic><topic>IM worm</topic><topic>Internet</topic><topic>Internet worms</topic><topic>P2P worm</topic><topic>State of the art</topic><topic>Strategy</topic><topic>worm containment</topic><topic>worm detection</topic><topic>Worms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>TANG, Yong</creatorcontrib><creatorcontrib>LUO, Jiaqing</creatorcontrib><creatorcontrib>XIAO, Bin</creatorcontrib><creatorcontrib>WEI, Guiyi</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Information and Systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>TANG, Yong</au><au>LUO, Jiaqing</au><au>XIAO, Bin</au><au>WEI, Guiyi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Concept, Characteristics and Defending Mechanism of Worms</atitle><jtitle>IEICE Transactions on Information and Systems</jtitle><addtitle>IEICE Trans. Inf. &amp; Syst.</addtitle><date>2009</date><risdate>2009</risdate><volume>E92.D</volume><issue>5</issue><spage>799</spage><epage>809</epage><pages>799-809</pages><issn>0916-8532</issn><issn>1745-1361</issn><eissn>1745-1361</eissn><abstract>Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types- Internet worms, P2P worms, email worms and IM (Instant Messaging) worms, based on the space in which a worm finds a victim target. The Internet worm is the focus of this article. We identify the characteristics of Internet worms in terms of their target finding strategy, propagation method and anti-detection capability. Then, we explore state-of-the-art worm detection and worm containment schemes. This article also briefly presents the characteristics, defense methods and related research work of P2P worms, email worms and IM worms. Nowadays, defense against worms remains largely an open problem. In the end of this article, we outline some future directions on the worm research.</abstract><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1587/transinf.E92.D.799</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0916-8532
ispartof IEICE Transactions on Information and Systems, 2009/05/01, Vol.E92.D(5), pp.799-809
issn 0916-8532
1745-1361
1745-1361
language eng
recordid cdi_proquest_miscellaneous_889410131
source J-STAGE (Japan Science & Technology Information Aggregator, Electronic) Freely Available Titles - Japanese; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Classification
Containment
Electronic mail
Email
Email worm
IM worm
Internet
Internet worms
P2P worm
State of the art
Strategy
worm containment
worm detection
Worms
title Concept, Characteristics and Defending Mechanism of Worms
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T09%3A42%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Concept,%20Characteristics%20and%20Defending%20Mechanism%20of%20Worms&rft.jtitle=IEICE%20Transactions%20on%20Information%20and%20Systems&rft.au=TANG,%20Yong&rft.date=2009&rft.volume=E92.D&rft.issue=5&rft.spage=799&rft.epage=809&rft.pages=799-809&rft.issn=0916-8532&rft.eissn=1745-1361&rft_id=info:doi/10.1587/transinf.E92.D.799&rft_dat=%3Cproquest_cross%3E889410131%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=889410131&rft_id=info:pmid/&rfr_iscdi=true