computer worm
Our editors will review what you’ve submitted and determine whether to revise the article.
- Academia - Computer worm ecology in encounter-based networks
- Virginia Polytechnic Institute and State University - Department of Computer Science - A Taxonomy of Computer Worms
- International Journal of Trend in Research and Development - Malicious computer worms and viruses: A survey
- University of Florida - Department of Computer and Information Science and Engineering - Computer Worm Ecology in Encounter-based Networks (Invited Paper)
- Related Topics:
- cybercrime
- malware
- Stuxnet
- zombie computer
- antivirus software
computer worm, computer program designed to furtively copy itself into other computers. Unlike a computer virus, which “infects” other programs in order to transmit itself to still more programs, worms are generally independent programs and need no “host.” In fact, worms typically need no human action to replicate across networks.
On November 2, 1988, a computer science student at Cornell University named Robert Morris released the first worm onto the Internet from the Massachusetts Institute of Technology. (As a guest on the campus, he hoped to remain anonymous.) The worm was an experimental self-propagating and replicating computer program that took advantage of flaws in certain e-mail protocols. Because of a mistake in its programming, rather than just sending copies of itself to other computers, this software kept replicating itself on each infected system, filling all the available computer memory. Before a fix was found, the worm had brought some 6,000 computers (one-tenth of the Internet) to a halt. Although Morris’s worm cost time and millions of dollars to fix, the event had few commercial consequences, for the Internet had not yet become a fixture of economic affairs (see e-commerce). That Morris’s father was the head of computer security for the U.S. National Security Agency led the press to treat the event more as a high-tech Oedipal drama than as a foreshadowing of things to come.
Whereas the next few worm outbreaks were typically pranks and relatively benign, cybercriminals began using them to create zombie computers, linked by the millions in botnets, that were activated to send out spam, often for hire, or to flood Web sites with denial-of-service attacks, often involving blackmail schemes.