Case study: Morris worm
Introduction
In November 1988, as a student of Computer Science
from Cornell University, writes experimental program "Worm", which is
able to self-replicate and spread over the Internet using flaws in UNIX
programs for the exchange of electronic mail. In order to conceal his true
identity, Morris is "injected" worms in the network using computers
MIT. To his dismay, Morris was soon determined that neither his program is not
perfect - multiplied nor spread is much greater than expected. Due to the
resulting overload, many computers in the neighborhood are simply blocked or
become "catatonic". When he saw what was happening, panic Morris
called friends from Harvard, trying to find a solution. Soon they sent an
anonymous message advising others how to disrupt the replication and
propagation of worms through the network. Unfortunately, computer connections
are at that point were already congested Morris's program, so that the message
to the audience broke too late .
After twelve hours, the guys from Berkeley are
managed independently of Morris, to make effective recipe that would spread the
worm could stop. The situation began to normalize only a few days, after
instructions for congested links have not been able to penetrate to the
thousands of users who had already dropped out of the system. The focus of the
public is gradually turning towards the one who is all cooked. Name Robert
Morris appeared in the "New York Times" and before the investigation
is completed . Morris was ultimately charged with "abuse and
fraud using computers" and sentenced to three years of police supervision
(with costs), 400 hours of community amenities and 10,000 dollar fine. The
court, however, was gracious: Morris is for only one night their galloping
"worm" from the system out to thousands of military, university and
government computer, where the cost of "recovery" totaled 200 to
50,000 dollars per computer.
Architecture
of the worm
Conferring to its inventor, Morris' worm it's not
made for making any harm, but rather to device the extent of the Internet. Morris’
worm was discharged from MIT in order to conceal the point that the Kornel its
creator. He has worked both as exhibited known weaknesses of Unix, sendmail, a
finger-a, and rsh-and / rexec's, and weak passwords. As a result of reliance on
the rsh (which is excluded in the non-confidential networks), repairs to
sendmail, finger-in, widely used fail2ban-and alike software, and upgraded responsiveness
of the risks of frail passwords, must not prosper in a well-organized systems .
Apparently unintentional result of code caused him
to be more harmful: PC can be infested numerous times as it slowed and can
become useless. This can create the effect of divergence shell and broke the PC.
The primary body of the Morris’ worm is ready to stain DEC VAX engines, which
runs 4BSD, and Sun-3 framework. Adaptable C "gathering snare" part of
the worm was developed to hasten (download) the primary body, and not able to
deal with different frameworks, stew them and makes them fringe casualties.
Error
Dangerous error that turned worms from benign to
infectious mechanism was expanding. The worm is able to strike a new PC asking
him if there is a copy of which was loaded. But only this would easily repel
worms: all they could to launch a method that would be answered with
"yes" after he was asked if the copy exist, and the worm will not be
attacked. Protection of this is enthused by Michael Rabin's intonation,
"Randomization". For recompense this option, the worm was made to copy even though
the answer is YES one of seven times. The level of copying showed unnecessary,
the worm range quickly, affecting some PCs numerous times. Rabin alleged that
the Morris worm first need to examine the simulator .
The
effect of worms
Estimated damage caused by the worm was between
100,000-10,000,000 dollars. It was reported about 6,000 UNIX infected Morris's
worm, however, Morris's fellow Pol Graham said that the assessment made Approx
method, so it is assumed that the 60,000 computers have been on the Internet
and that the worm may have infested 10% of them. Some regional networks are disconnected
from the Internet for a few days, so that the worm would not have entered into
their systems.
Robert Morris was condemned to 3years of conditional
imprisonment, 400 hours of public service, an adequate of 13.326 US dollars.
Morris Worm is sometimes called the "Big Worm", because of its distressing
influence on the Internet that time.
Conclusion
and recommendation
When we talk about security is very important when
we go in its implementation to consider all possible forms and types of threats
that may endanger us. Taking these things into account it is important to
understand how the network is essential for the protection of a system. For
these reasons it is necessary to consider the network infrastructure from all
aspects. Each company has specific needs and requirements when the network and
communications in question and those needs and requirements must be consistent
with that to ensure that there is no unauthorized access to the network. On the
other it is necessary to provide the level of protection that is required, and
not go a step further in the procedures and levels of protection, because how
can you help the other hand, can slow down the productivity of a company if
there are redundant procedures.
The 1988 attack is also known as the Morris Worm,
created by Robert T. Morris. It was the first automated network security
attack. Morris is the first individual to be imprisoned under the American
Computer Fraud and Abuse Act of 1986. He was condemned to parole for 3 years
with 400 hours of work and a fine of $ 10.500. The estimates of Interpol
computer criminality are caused by the damage done immediately behind the drug
and weapons trade. Anonymity is one of the fundamental features of computer
crime.
Comments
Post a Comment