Concept, Characteristics and Defending Mechanism of Worms
Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types- Internet worms, P2P worms, email wo...
Gespeichert in:
Veröffentlicht in: | IEICE Transactions on Information and Systems 2009/05/01, Vol.E92.D(5), pp.799-809 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 809 |
---|---|
container_issue | 5 |
container_start_page | 799 |
container_title | IEICE Transactions on Information and Systems |
container_volume | E92.D |
creator | TANG, Yong LUO, Jiaqing XIAO, Bin WEI, Guiyi |
description | Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types- Internet worms, P2P worms, email worms and IM (Instant Messaging) worms, based on the space in which a worm finds a victim target. The Internet worm is the focus of this article. We identify the characteristics of Internet worms in terms of their target finding strategy, propagation method and anti-detection capability. Then, we explore state-of-the-art worm detection and worm containment schemes. This article also briefly presents the characteristics, defense methods and related research work of P2P worms, email worms and IM worms. Nowadays, defense against worms remains largely an open problem. In the end of this article, we outline some future directions on the worm research. |
doi_str_mv | 10.1587/transinf.E92.D.799 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_889410131</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>889410131</sourcerecordid><originalsourceid>FETCH-LOGICAL-c557t-35ee6985a8c0a698fb24677e8a25e0cce99044e9937f1f20df56025d8992b1153</originalsourceid><addsrcrecordid>eNpdkD1PwzAURS0EEqXwB5iysZDg58SJPaK05UNFLCBGy3We21SJU-x04N9jVOjA8u4b7rnDIeQaaAZcVHej1y60zmZzybJZVkl5QiZQFTyFvIRTMqESylTwnJ2TixC2lIJgwCdE1oMzuBtvk3qjvTYj-jaMrQmJdk0yQ4uuad06eUGz0a4NfTLY5GPwfbgkZ1Z3Aa9-c0reF_O3-jFdvj481ffL1HBejWnOEUspuBaG6vjYFSvKqkKhGUdqDEpJiyLevLJgGW0sLynjjZCSrQB4PiU3h92dHz73GEbVt8Fg12mHwz4oIWQBFHKITXZoGj-E4NGqnW977b8UUPWjSf1pUlGTmqmoKULPB2gbRr3GI6J9tNDhf4QfM8LHUnTjFbr8Gwsud-g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>889410131</pqid></control><display><type>article</type><title>Concept, Characteristics and Defending Mechanism of Worms</title><source>J-STAGE (Japan Science & Technology Information Aggregator, Electronic) Freely Available Titles - Japanese</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>TANG, Yong ; LUO, Jiaqing ; XIAO, Bin ; WEI, Guiyi</creator><creatorcontrib>TANG, Yong ; LUO, Jiaqing ; XIAO, Bin ; WEI, Guiyi</creatorcontrib><description>Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types- Internet worms, P2P worms, email worms and IM (Instant Messaging) worms, based on the space in which a worm finds a victim target. The Internet worm is the focus of this article. We identify the characteristics of Internet worms in terms of their target finding strategy, propagation method and anti-detection capability. Then, we explore state-of-the-art worm detection and worm containment schemes. This article also briefly presents the characteristics, defense methods and related research work of P2P worms, email worms and IM worms. Nowadays, defense against worms remains largely an open problem. In the end of this article, we outline some future directions on the worm research.</description><identifier>ISSN: 0916-8532</identifier><identifier>ISSN: 1745-1361</identifier><identifier>EISSN: 1745-1361</identifier><identifier>DOI: 10.1587/transinf.E92.D.799</identifier><language>eng</language><publisher>The Institute of Electronics, Information and Communication Engineers</publisher><subject>Classification ; Containment ; Electronic mail ; Email ; Email worm ; IM worm ; Internet ; Internet worms ; P2P worm ; State of the art ; Strategy ; worm containment ; worm detection ; Worms</subject><ispartof>IEICE Transactions on Information and Systems, 2009/05/01, Vol.E92.D(5), pp.799-809</ispartof><rights>2009 The Institute of Electronics, Information and Communication Engineers</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c557t-35ee6985a8c0a698fb24677e8a25e0cce99044e9937f1f20df56025d8992b1153</citedby><cites>FETCH-LOGICAL-c557t-35ee6985a8c0a698fb24677e8a25e0cce99044e9937f1f20df56025d8992b1153</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,1877,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>TANG, Yong</creatorcontrib><creatorcontrib>LUO, Jiaqing</creatorcontrib><creatorcontrib>XIAO, Bin</creatorcontrib><creatorcontrib>WEI, Guiyi</creatorcontrib><title>Concept, Characteristics and Defending Mechanism of Worms</title><title>IEICE Transactions on Information and Systems</title><addtitle>IEICE Trans. Inf. & Syst.</addtitle><description>Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types- Internet worms, P2P worms, email worms and IM (Instant Messaging) worms, based on the space in which a worm finds a victim target. The Internet worm is the focus of this article. We identify the characteristics of Internet worms in terms of their target finding strategy, propagation method and anti-detection capability. Then, we explore state-of-the-art worm detection and worm containment schemes. This article also briefly presents the characteristics, defense methods and related research work of P2P worms, email worms and IM worms. Nowadays, defense against worms remains largely an open problem. In the end of this article, we outline some future directions on the worm research.</description><subject>Classification</subject><subject>Containment</subject><subject>Electronic mail</subject><subject>Email</subject><subject>Email worm</subject><subject>IM worm</subject><subject>Internet</subject><subject>Internet worms</subject><subject>P2P worm</subject><subject>State of the art</subject><subject>Strategy</subject><subject>worm containment</subject><subject>worm detection</subject><subject>Worms</subject><issn>0916-8532</issn><issn>1745-1361</issn><issn>1745-1361</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><recordid>eNpdkD1PwzAURS0EEqXwB5iysZDg58SJPaK05UNFLCBGy3We21SJU-x04N9jVOjA8u4b7rnDIeQaaAZcVHej1y60zmZzybJZVkl5QiZQFTyFvIRTMqESylTwnJ2TixC2lIJgwCdE1oMzuBtvk3qjvTYj-jaMrQmJdk0yQ4uuad06eUGz0a4NfTLY5GPwfbgkZ1Z3Aa9-c0reF_O3-jFdvj481ffL1HBejWnOEUspuBaG6vjYFSvKqkKhGUdqDEpJiyLevLJgGW0sLynjjZCSrQB4PiU3h92dHz73GEbVt8Fg12mHwz4oIWQBFHKITXZoGj-E4NGqnW977b8UUPWjSf1pUlGTmqmoKULPB2gbRr3GI6J9tNDhf4QfM8LHUnTjFbr8Gwsud-g</recordid><startdate>2009</startdate><enddate>2009</enddate><creator>TANG, Yong</creator><creator>LUO, Jiaqing</creator><creator>XIAO, Bin</creator><creator>WEI, Guiyi</creator><general>The Institute of Electronics, Information and Communication Engineers</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2009</creationdate><title>Concept, Characteristics and Defending Mechanism of Worms</title><author>TANG, Yong ; LUO, Jiaqing ; XIAO, Bin ; WEI, Guiyi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c557t-35ee6985a8c0a698fb24677e8a25e0cce99044e9937f1f20df56025d8992b1153</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Classification</topic><topic>Containment</topic><topic>Electronic mail</topic><topic>Email</topic><topic>Email worm</topic><topic>IM worm</topic><topic>Internet</topic><topic>Internet worms</topic><topic>P2P worm</topic><topic>State of the art</topic><topic>Strategy</topic><topic>worm containment</topic><topic>worm detection</topic><topic>Worms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>TANG, Yong</creatorcontrib><creatorcontrib>LUO, Jiaqing</creatorcontrib><creatorcontrib>XIAO, Bin</creatorcontrib><creatorcontrib>WEI, Guiyi</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Information and Systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>TANG, Yong</au><au>LUO, Jiaqing</au><au>XIAO, Bin</au><au>WEI, Guiyi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Concept, Characteristics and Defending Mechanism of Worms</atitle><jtitle>IEICE Transactions on Information and Systems</jtitle><addtitle>IEICE Trans. Inf. & Syst.</addtitle><date>2009</date><risdate>2009</risdate><volume>E92.D</volume><issue>5</issue><spage>799</spage><epage>809</epage><pages>799-809</pages><issn>0916-8532</issn><issn>1745-1361</issn><eissn>1745-1361</eissn><abstract>Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types- Internet worms, P2P worms, email worms and IM (Instant Messaging) worms, based on the space in which a worm finds a victim target. The Internet worm is the focus of this article. We identify the characteristics of Internet worms in terms of their target finding strategy, propagation method and anti-detection capability. Then, we explore state-of-the-art worm detection and worm containment schemes. This article also briefly presents the characteristics, defense methods and related research work of P2P worms, email worms and IM worms. Nowadays, defense against worms remains largely an open problem. In the end of this article, we outline some future directions on the worm research.</abstract><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1587/transinf.E92.D.799</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0916-8532 |
ispartof | IEICE Transactions on Information and Systems, 2009/05/01, Vol.E92.D(5), pp.799-809 |
issn | 0916-8532 1745-1361 1745-1361 |
language | eng |
recordid | cdi_proquest_miscellaneous_889410131 |
source | J-STAGE (Japan Science & Technology Information Aggregator, Electronic) Freely Available Titles - Japanese; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Classification Containment Electronic mail Email worm IM worm Internet Internet worms P2P worm State of the art Strategy worm containment worm detection Worms |
title | Concept, Characteristics and Defending Mechanism of Worms |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T09%3A42%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Concept,%20Characteristics%20and%20Defending%20Mechanism%20of%20Worms&rft.jtitle=IEICE%20Transactions%20on%20Information%20and%20Systems&rft.au=TANG,%20Yong&rft.date=2009&rft.volume=E92.D&rft.issue=5&rft.spage=799&rft.epage=809&rft.pages=799-809&rft.issn=0916-8532&rft.eissn=1745-1361&rft_id=info:doi/10.1587/transinf.E92.D.799&rft_dat=%3Cproquest_cross%3E889410131%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=889410131&rft_id=info:pmid/&rfr_iscdi=true |