Skip to main content

Worms have become a real threat for computer users for the past few years. Worm is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. It is coming out so fast these days that even the most accurate scanners cannot track all of the new ones. Indeed until now there is no specific way to classify the worm. To understand the threats posed by the worms, this research had been carried out. In this paper the researchers proposed a new way to classify the worms which later is used as the basis to build up a system which is called as the EDOWA system to detect worms attack. Details on how the new worm of classification which is called as EDOWA worm classification is produced are explained in this paper. Hopefully this new worm classification can be used as the basis model to produce a system either to detect or defend organization from worms attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. L. McCarthy, “Own Your Space: Keep Yourself and Your Stuff Safe Online (Book),” Addison-Wesley, Boston, MA, 2006.

    Google Scholar 

  2. C. Nachenberg, “Computer Parasitology,” Proceedings of the Ninth International Virus Bulletin Conference, September/October 1999, pp. 1–25.

    Google Scholar 

  3. J. Nazario, “Defense and Detection Strategies against Internet Worms” (BOOK), Artech House Inc., 2003. Or a paper entitles “The Future of Internet Worm” by Nazario, J., Anderson, J., Wash, R., and Connelly, C. Crimelabs Research, Norwood, USA, 2001.

    Google Scholar 

  4. N. Weaver, V. Paxson, S. Staniford and R. Cunningham, “A Taxonomy of Computer Wor m s,” Proceedings of the ACM CCS Workshop on Rapid Malcode (WORM), pp. 11–18, 2003.

    Google Scholar 

  5. D.M. Kienzle and M.C. Elder, “Recent Worms: A Survey and Trends,” Proceedings of the ACM CCS Workshop on Rapid Malcode (WORM), pp. 1–10, 2003.

    Google Scholar 

  6. D.J. Albanese, M.J. Wiacek, C.M. Salter and J.A. Six, “The Case for Using Layered Defenses to Stop Worms (Report style),” UNCLASSIFIED-NSA Report, pp. 10–22, 2004.

    Google Scholar 

  7. C.C. Zou, D. Towsley and W. Gong, “Email worm modeling and defense,” Computer Communications and Networks, ICCCN 2004, pp. 409–414, 2004.

    Google Scholar 

  8. D. Christoffersen and B.J. Mauland, “Worm Detection Using Honeypots (Thesis or Dissertation style),” Master dissertation, Norwegian University of Science and Technology, June 2006.

    Google Scholar 

  9. H. Berghel, “The Code Red Worm: Malicious software knows no bounds,” Communication of the ACM, vol. 44, no. 12, pp. 15–19, 2001.

    Article  Google Scholar 

  10. CERT. CERT Advisory CA-2002–25 Integer Overflow in XDR Library, http://www. cert.org/advisories/ca-2002–25.html

  11. M. Bailey, E. Cooke, F. Jahanian, D. Watson and J. Nazario, “The Blaster Worm: Then and Now,” IEEE Security & Privacy, vol. 3, no. 4, pp. 26–31, 2005.

    Article  Google Scholar 

  12. C. Shannon and D. Moore, “The Spread of the Witty Worm,” IEEE Security & Privacy, vol. 2, no. 4, pp. 36–50, 2004.

    Google Scholar 

  13. A. Tsow, “Phishing With Consumer Electronics: Malicious Home Routers,” 15th International World Wide Web Conference (WWW2006), Edinburgh, Scotland, May 2006.

    Google Scholar 

  14. C. Kruegel, E. Kirda, D. Mutz, W. Robertson and G. Vigna, “Polymorphic Worm detection using structural information of executables,” 8th International Symposium on Recent Advances in Intrusion Detection (RAID), 2005.

    Google Scholar 

  15. S.G. Cheetancheri, “Modeling a computer worm defense system (Thesis or Dissertation style),” Master dissertation, University of California, 1998.

    Google Scholar 

  16. C. Nachenberg, “The Evolving Virus Threat,” 23rd NISSC Proceedings, Baltimore, Maryland, 2000.

    Google Scholar 

  17. S. Staniford, President of Silicon Defense. “The Worm FAQ: Frequently Asked Questions on Worms and Worm Containment,” The Worm Information Center, 2003

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media B.V

About this chapter

Cite this chapter

Saudi, M.M., Tamil, E.M., Cullen, A.J., Woodward, M.E., Idris, M.Y.I. (2009). Reverse Engineering: EDOWA Worm Analysis and Classification. In: Ao, SI., Gelman, L. (eds) Advances in Electrical Engineering and Computational Science. Lecture Notes in Electrical Engineering, vol 39. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-2311-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-2311-7_24

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-2310-0

  • Online ISBN: 978-90-481-2311-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics