U3 System Security-69-75
U3 System Security-69-75
• Behavior-blocking software integrates with the operating system of a host computer and monitors
program behavior in real-time for malicious actions.
• The behavior blocking software then blocks potentially malicious actions before they have a
chance to affect the system.
• The concept of a computer worm was introduced in John Brunner’s 1975 SF novel The
Shockwave Rider.
• Network worm programs use network connections to spread from system to system.
• MORRIS WORM
WORM PROPAGATION MODEL
Recent Worm Attacks
• Code Red Worm
• DoS Attack
• Code Red II
• Installs Backdoor
• Slammer Worm
• Mydoom
• Trojan Horse and Adware
State of Worm Technology
• The state of the art in worm technology includes the following:
• Multi – Platform
• Multi – Exploit
• Ultrafast Spreading
• Polymorphic
• Metamorphic
• Transport Vehicles
• Zero-day Exploits