Lecture 12 - Class Notes October 16, 2008 Internet Worm...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Class Notes October 16, 2008 Internet Worm 11/2/88 released to internet, causing serious damage to network Robert Morris Jr. (now associate professor at MIT) at the time was a grad student at Cornell Worm had 3 objectives -Determine where it could spread -Spread infection -Remain undiscovered and undiscoverable Primary effect -Resource exhaustion (unintended by Morris) -Code was supposed to check if a site was already infected and if so, terminate the attack. - The resource exhaustion was a result of flawed code, system performance degraded until systems had to be removed from the network. This caused isolation and the inability of the machines to work together. The end result was about 6,000 sites were removed from the network. The damage estimate ranges between $100,000 and $97 million dollars. How did it work? Targeted version 4 of Berkely Unix OS. 3 techniques to find out where to spread: 1. Attempt to invade user account on target system. a.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

Lecture 12 - Class Notes October 16, 2008 Internet Worm...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online