Worms

Worms

A computer worm is a standalone malware computer program that replicates itself in orderto spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Many worms that have been created are designed only to spread, and do not attempt to change the systems they pass through. However, as the Morris worm and Mydoom showed, even these payload free worms can cause major disruption by increasing network traffic and other unintended effects. Countermeasures
Worms spread by exploiting vulnerabilities in operating systems. Vendors with security problems supply regular security updates, and if these are installed to a machine then the majority of worms are unable to spread to it. If a vulnerability is disclosed before the security patch released by the vendor, a zero—day attack is possible.
Users need to be wary of opening unexpected email, and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick the end-user into running malicious code.
Anti-virus and anti—spyware software are helpful, but must be kept up—to—date with new pattern files at least every few days. The use of a firewall is also recommended. In the April—June, M, issue of IEEE Transactions on Dependable and Secure Computing, computer scientists describe a potential new way to combat internet worms. The researchers discovered how to contain the kind of worm that scans the Internet randomly, looking for vulnerable hosts to infect. They found that the key is for software to monitor the number of scans that machines on a network sends out. When a machine starts sending out too many scans, it is a sign that it has been infected, allowing administrators to take it off line and check it for ma|ware. In addition, machine learning techniques can be used to detect new worms, by analyzing the behavior of the suspected computer.
Users can minimize the threat posed by worms by keeping their computers operating systemand other software up to date, avoiding opening unrecognized or unexpected emails and running firewall and antivirus software.[20]


Mitigation techniques include:
ACLs in routers and switches Packet-filters
TCP Wrapper/ACL enabled network service daemons
Nullroute



1 comment:

  1. Do you need to increase your credit score?
    Do you intend to upgrade your school grade?
    Do you want to hack your cheating spouse Email, whatsapp, Facebook, instagram or any social network?
    Do you need any information concerning any database.
    Do you need to retrieve deleted files?
    Do you need to clear your criminal records or DMV?
    Do you want to remove any site or link from any blog?
    you should contact this hacker, he is reliable and good at the hack jobs..
    contact : cybergoldenhacker at gmail dot com

    ReplyDelete

All Technology @ Tips And Triks 2018. Theme images by enot-poloskun. Powered by Blogger.