Abstract
Computer viruses have evolved from funny artifacts which were crafted mostly to annoy inexperienced users to sophisticated tools for industrial espionage, unsolicited bulk email (ube), piracy and other illicit acts. Despite the steadily increasing number of new malware species, we observe the formation of monophyletic clusters. In this paper, using public available data, we demonstrate the departure of the democratic virus writing model in which even moderate programmers managed to create successful virus strains to an entirely aristocratic ecosystem of highly evolved malcode.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ferbrache, D.: A Pathology of Computer Viruses. Springer, NY (1992)
Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley, Upper Saddle River (2005)
Skoudis, E.: Malware: Fighting Malicious Code, 6th edn. Computer Networking and Distributed Systems. Prentice Hall, NJ (2004)
Cohen, F.: Computer Viruses: Theory and Experiments. In: Proceedings of the 7th National Security Conference, pp. 240–263 (1984)
Anderson, R., Böhme, R., Clayton, R., Moore, T.: Security Economics and the Internal Market. Technical report, European Network and information Security Agency (ENISA) (2008)
Turner, D., Blackbird, J., Low, M.K., Adams, T., McKinney, D., Entwisle, S., Wueest, M.L.C., Wood, P., Bleaken, D., Ahmad, G., Kemp, D., Samnani, A.: Symantec Global Internet Security Threat Report. Trends for 2008. Technical report, Symantec (2009)
Forrest, S., Hofmeyr, S., Somayaji, A.: Computer Immunology. Communications of the ACM 40(10), 88–96 (1997)
Vlachos, V., Spinellis, D., Androutsellis-Theotokis, S.: Biological Aspects of Computer Virology. LNICST, vol. 26, pp. 209–219 (2010)
Li, J., Knickerbocker, P.: Functional Similarities Between Computer Worms and Bilogical Pathogens. Computers & Security 26, 338–347 (2007)
Geer, D.: Monoculture on the Back of the Envelope. Login 30(6), 6–8 (2005)
Goth, G.: Addressing the Monoculture. IEEE Security & Privacy 1(6), 8–10 (2003)
Geer, D., Bace, R., Gutmann, P., Metzger, P., Pfleeger, C.P., Quarterman, J.S., Schneier, B.: Cyber Insecurity: The Cost of Monopoly. Technical report, Computer & Communications Industry Association (2003)
Geer, D.: The Evolution of Security. ACM Queue, 31–35 (2007)
Somayaji, A., Hofmeyr, S., Forrest, S.: Principles of a Computer Immune System. In: Meeting on New Security Paradigms, September 23-26, pp. 75–82. ACM, Langdale (1997)
Anagnostakis, K., Greenwald, M., Ioannidis, S., Keromytis, A., Li, D.: A Cooperative Immunization System for an Untrusting Internet. In: Proceedings of the 11th IEEE International Conference on Networks (ICON), pp. 403–408 (2003)
Sidiroglou, S., Keromytis, A.: A Network Worm Vaccine Architecture. In: IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security, Linz, Austria (2003)
de la Cuadra, F.: The Geneology of Malware. Network Security, 17–20 (2007)
Hayes, M., Walenstein, A., Lakhotia, A.: Evaluation of Malware Phylogeny Modelling Systems Using Automated Variant Generation. Journal in Computer Virology 5(4), 335–343 (2009)
Karim, M., Walenstein, A., Lakhotia, A., Parida, L.: Malware Phylogeny Using Permutations of Code. Journal in Computer Virology 1(1), 13–23 (2005)
Seewald, A.K.: Towards Automating Malware Classification and Characterization. In: Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik (German-Language Proceedings), Saarbrücken, pp. 291–302 (2008)
Gordon, S.: What is Wild? In: Proceedings of the 20th National Information Systems Security Conference (1997)
Bustamante, P.: The Disconnect Between the WildList and Reality. Technical report, PandaLabs (2007)
Marx, A., Dessman, F.: The WildList is Dead, Long Live the WildList! In: Virus Bulletin Conference, pp. 136–146 (2007)
The WildList Organization International: Wildlist, http://www.wildlist.org/WildList/201001.htm
Gordon, S.: Inside the Mind of Dark Avenger. In: Virus News International (1993)
Gordon, S.: Generic Virus Writer. In: 4th International Virus Bulletin Conference, Jersey, UK (1994)
Gordon, S.: Generic Virus Writer II. In: 6th International Virus Bulletin Conference, Brighton, UK (1996)
Gordon, S.: Understanding the adversary. IEEE Security & Privacy 4(5), 67–70 (2006)
Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G., Paxson, V., Savage, S.: Spamalytics: an empirical analysis of spam marketing conversion. Commun. ACM 52(9), 99–107 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Vlachos, V., Ilioudis, C., Papanikolaou, A. (2012). On the Evolution of Malware Species. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds) Global Security, Safety and Sustainability & e-Democracy. e-Democracy ICGS3 2011 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33448-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-33448-1_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33447-4
Online ISBN: 978-3-642-33448-1
eBook Packages: Computer ScienceComputer Science (R0)