A worm misuse pattern

Eduardo B. Fernandez*, Nobukazu Yoshioka, Hironori Washizaki

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

We have proposed a new type of pattern, the misuse pattern. This pattern describes, from the point of view of the attacker, how a type of attack or misuse is performed (what system units it uses and how); it also provides ways of stopping the attack by enumerating possible security patterns that can be applied for this purpose, and helps analyzing the attack once it has happened by indicating where can we find forensics data as well as what type of data. A catalog of misuse patterns is needed to let designers evaluate their designs with respect to possible threats. We present here a misuse pattern for a generic worm, which describes the essential and typical characteristics of this type of malware. We consider how to stop this malware and we also discuss some examples and variations.

Original languageEnglish
Title of host publicationAsianPLoP 2010 - 1st Asian Conference on Pattern Languages of Programs, Proceedings
DOIs
Publication statusPublished - 2010
Event1st Asian Conference on Pattern Languages of Programs, AsianPLoP 2010 - Tokyo, Japan
Duration: 2010 Mar 162010 Mar 17

Publication series

NameACM International Conference Proceeding Series

Conference

Conference1st Asian Conference on Pattern Languages of Programs, AsianPLoP 2010
Country/TerritoryJapan
CityTokyo
Period10/3/1610/3/17

Keywords

  • Computer security
  • Misuse patterns
  • Viruses and worms

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A worm misuse pattern'. Together they form a unique fingerprint.

Cite this