|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T a
Length: 1376 (0x560) Types: TextFile Names: »abstract.latex«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦f36518b41⟧ »./worm/mit.tex.tar.z« └─⟦87f8973c9⟧ └─⟦this⟧ »abstract.latex«
%%%\begin{abstract} %%% This needs to be min of 3in from top of page and lower than the right col \vspace{.2in} \begin{center} {\bf Abstract} \end{center} In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a program which broke into computers on the network and which spread from one machine to another. This paper is a detailed analysis of the virus program\ifieee .\else itself, as well as the reactions of the besieged Internet community. We discuss the structure of the actual program, as well as the strategies the virus used to reproduce itself. We present the chronology of events as seen by our team at MIT, one of a handful of groups around the country working to take apart the virus, in an attempt to discover its secrets and to learn the network's vulnerabilities. \fi We describe the lessons that this incident has taught the Internet community and topics for future consideration and resolution. A detailed routine by routine description of the virus program including the contents of its built in dictionary is provided. %%\end{abstract} %%%\vspace{2in} %%%\noindent %%%Copyright \copyright\ 1988 Massachusetts Institute of Technology \\ %%%A version of this paper will be presented at the 1989 IEEE Symposium on Research in Security and Privacy