Beyond preliminary analysis of the WANK and OILZ worms: A case of study of malicious code

被引:10
|
作者
Longstaff, Thomas A. [1 ]
Schultz, E.Eugene [1 ]
机构
[1] Univ of California, Livermore, United States
来源
Computers and Security | 1993年 / 12卷 / 01期
关键词
Codes (symbols) - Computer networks - Computer viruses - Security of data;
D O I
10.1016/0167-4048(93)90013-U
中图分类号
学科分类号
摘要
In October 1989 a DECnet worm attacked the NASA Space Physics Analysis Network (SPAN) and the DOE's High-Energy Physics (HEP) and Energy Science (ES) networks. Approximately two weeks later a second worm, a modification of the first, attacked other systems. These worms (written in DCL) used several methods of propagation, including guessing accounts with an identical username and password and entering through system accounts and unpassworded accounts. The original version of the worm, WANK (Worms Against Nuclear Killers), contained bugs preventing, among other things, penetration into unpassworded accounts. In the second version, OILZ, some of the problems of the first worm were corrected. OILZ intruded into user accounts probed from remote systems already breached by this worm. OILZ masqueraded its presence, and its method of discovering user accounts and privileged access helped circumvent standard VMS alarm settings. The style of each worm code indicated that the worm evolved over time and was not written by a single individual. The paper focuses on selected procedures from both variations of the worm and analyzes the authorship and history of the development of this worm. This information may be useful not only in determining the origin of this malicious code, but also in studying the evolution of malicious code. This paper also presents some lessons learned from studying this attack and applies these lessons to recommendations for network policy. More than anything else, the WANK and OILZ worms demonstrate the need for effective password management and proper system and network configuration. Determining the source and style of malicious code can assist in developing policy and procedures for effectively detecting and preventing attacks of this type.
引用
收藏
页码:61 / 77
相关论文
共 50 条
  • [1] A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments
    Choi, Seul-Ki
    Lee, Taejin
    Kwak, Jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (03): : 1611 - 1625
  • [2] A Comparative Analysis between AI Generated Code and Human Written Code: A Preliminary Study
    Patel, Abhi
    Sultana, Kazi Zakia
    Samanthula, Bharath K.
    Proceedings - 2024 IEEE International Conference on Big Data, BigData 2024, 2024, : 7521 - 7529
  • [3] Beyond source code: The importance of other artifacts in software development (a case study)
    Robles, Gregorio
    Gonzalez-Barahona, Jesus M.
    Merelo, Juan Julian
    JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (09) : 1233 - 1248
  • [4] Code Smell Prioritization with Business Process Mining and Static Code Analysis: A Case Study
    Islam, Md Rofiqul
    Al Maruf, Abdullah
    Cerny, Tomas
    ELECTRONICS, 2022, 11 (12)
  • [5] The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study
    Amin, Raid W.
    Sevil, Hakki Erhan
    Kocak, Salih
    Francia, Guillermo, III
    Hoover, Philip
    INFORMATION, 2021, 12 (01) : 1 - 18
  • [6] Understanding Low-Code or No-Code Adoption in Software Startups: Preliminary Results from a Comparative Case Study
    Rafiq, Usman
    Filippo, Cenacchi
    Wang, Xiaofeng
    PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROFES 2022, 2022, 13709 : 390 - 398
  • [7] Automated Classification of Static Code Analysis Alerts: A Case Study
    Yuksel, Ulas
    Sozer, Hasan
    2013 29TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE (ICSM), 2013, : 532 - 535
  • [8] Analysis of a Code Review Tool Evolution: A Case Study of Rietveld to Gerrit
    Mizuno, Osamu
    Liang, Junwei
    INTERNATIONAL JOURNAL OF SOFTWARE INNOVATION, 2015, 3 (01) : 16 - 35
  • [9] ENVIRONMENTAL ANALYSIS AND DIAGNOSIS: ADJUSTMENTS TO THE NEW FOREST CODE - A CASE STUDY
    Giunti, Otavio Duarte
    Rodrigues de Sa, Elisa Bergamini
    de Oliveira, Thiago Cardoso
    Silva, Ariana Vieira
    REVISTA AGROGEOAMBIENTAL, 2014, : 33 - 39
  • [10] PRELIMINARY ANALYSIS OF THE DEVELOPMENT AND IMPLEMENTATION OF THE MOOC PROJECT: A CASE STUDY
    Smyrnova-Trybulska, Eugenia
    Sekret, Iryna
    Morze, Nataliia
    E-LEARNING IN THE TIME OF COVID-19, 2021, 13 : 137 - 150