8.4 ╚φ≥σ≡φσ≥εΓ±ΩΦΘ ≈σ≡Γⁿ

[BROCK]
Brock, J., "November 1988 Internet Computer Virus and the Vulnerability of National Telecommunications Networks to Computer Viruses", GAO/T-IMTEC-89-10, Washington, DC, 20 July 1989.

╤ΓΦΣσ≥σδⁿ±ΩΦσ ∩εΩαταφΦ  ─µσΩα ┴≡εΩα, ΣΦ≡σΩ≥ε≡α ε≥Σσδα ∩≡αΓΦ≥σδⁿ±≥ΓσφφεΘ Φφ⌠ε≡∞α÷ΦΦ ╤╪└, ∩σ≡σΣ ∩εΣΩε∞Φ≥σ≥ε∞ ∩ε ≥σδσΩε∞∞≤φΦΩα÷Φ ∞ Φ ⌠Φφαφ±α∞, Ωε∞Φ≥σ≥α∞Φ ∩ε ²φσ≡πσ≥ΦΩσ Φ ≥ε≡πεΓδσ, ∩αδα≥εΘ ∩≡σΣ±≥αΓΦ≥σδσΘ.

[EICHIN89]
Eichin, M., and J. Rochlis, "With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988", Massachusetts Institute of Technology, February 1989.

╤εΣσ≡µΦ≥ Σσ≥αδⁿφ√Θ αφαδΦτ ∩≡επ≡α∞∞√-≈σ≡Γ . ╤≥α≥ⁿ  εß±≤µΣασ≥ ε±φεΓφ√σ ∞ε∞σφ≥√ ∩≡επ≡α∞√-≈σ≡Γ , α τα≥σ∞ Ω≡α≥Ωε ≡α±±∞α≥≡ΦΓασ≥ ±≥≡α≥σπΦΦ, ⌡≡εφεδεπΦ■, ≤≡εΩΦ Φ φσ≡σ°σφφ√σ ∩≡εßδσ∞√. ╥αΩµσ ΓΩδ■≈σφε ßεδⁿ°εσ ∩≡ΦδεµσφΦσ ± ≥σΩ±≥ε∞ ∩≡επ≡α∞∞√ Φ ±±√δΩΦ.

[EISENBERG89]
Eisenberg, T., D. Gries, J. Hartmanis, D. Holcomb, M. Lynn, and T. Santoro, "The Computer Worm", Cornell University, 6 February 1989.

╬≥≈σ≥ ╩ε≡φσδδⁿ±Ωεπε ╙φΦΓσ≡±Φ≥σ≥σ, ∩≡σΣ±≥αΓδσφφ√Θ ≡σΩ≥ε≡≤ ≤φΦΓσ≡±Φ≥σ≥α 6 ⌠σΓ≡αδ  1989 πεΣα, εß ╚φ≥σ≡φσ≥εΓ±Ωε∞ ≈σ≡Γσ.

[GAO]
U.S. General Accounting Office, "Computer Security - Virus Highlights Need for Improved Internet Management", United States General Accounting Office, Washington, DC, 1989.

▌≥ε≥ 36-±≥≡αφΦ≈φ√Θ ε≥≈σ≥(GAO-IMTEC-89-57) ε∩Φ±√Γασ≥ ╚φ≥σ≡φσ≥εΓ±ΩΦΘ ≈σ≡Γⁿ Φ σπε ∩ε±δσΣ±≥ΓΦ . ▀Γδ σ≥±  ⌡ε≡ε°Φ∞ εßτε≡ε∞ ≡ατδΦ≈φ√⌡ απσφ≥±≥Γ ╤╪└, ≡αßε≥α■∙Φ⌡ ±σΘ≈α± Γ ╚φ≥σ≡φσ≥σ Φ Φ Φ⌡ ∩≡εßδσ∞ Γ εßδα±≥Φ Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ Φ ≡αßε≥√ Γ ±σ≥ ⌡.

─ε±≥≤∩σφ Γ ε∩σ≡α≥ΦΓφε∞ ≡σµΦ∞σ φα ⌡ε±≥σ nnsc.nsf.net, ΣΦ≡σΩ≥ε≡ΦΦ pub, ⌠αΘδσ GAO_RPT; Φ φα nis.nsf.net, ΣΦ≡σΩ≥ε≡ΦΦ nsfnet, ⌠αΘδσ GAO_RPT.TXT.

[REYNOLDS89]
The Helminthiasis of the Internet, RFC 1135, USC/Information Sciences Institute, Marina del Rey, CA, December 1989.

▌≥ε≥ ε≥≈σ≥  Γδ σ≥±  ≡σ≥≡ε±∩σΩ≥ΦΓεΘ τα≡αµσφΦ  ╚φ≥σ≡φσ≥α ≈σ≡Γσ∞, Ωε≥ε≡εσ ∩≡εΦτε°δε Γσ≈σ≡ε∞ 2 φε ß≡  1988 πεΣα. ▌≥ε≥ ΣεΩ≤∞σφ≥ Σασ≥ ε≈σ≡Ω τα≡αµσφΦ , εßφα≡≤µσφΦ  Φ Φτδσ≈σφΦ . ╥αΩµσ ≡α±±∞α≥≡ΦΓα■≥±  ΓδΦ φΦσ ≈σ≡Γ  φα ╚φ≥σ≡φσ≥εΓ±Ωεσ ±εεß∙σ±≥Γε, ²≥Φ≈σ±ΩΦσ ∩≡αΓΦδα, ≡εδⁿ ±≡σΣ±≥Γ ∞α±±εΓεΘ Φφ⌠ε∞α÷ΦΦ, ∩≡σ±≥≤∩δσφΦσ Γ Ωε∞∩ⁿ■≥σ≡φε∞ ∞Φ≡σ, Φ ß≤Σ≤∙σσ. ╬≥≈σ≥ ±εΣσ≡µΦ≥ 4 ∩≤ßδΦΩα÷ΦΦ, Ωε≥ε≡√σ Σσ≥αδⁿφε ε∩Φ±√Γα■≥ ²≥≤ ΩεφΩ≡σ≥φ≤■ ∩α≡ατΦ≥Φ≈σ±Ω≤■ Ωε∞∩ⁿ■≥σ≡φ≤■ ∩≡επ≡α∞∞≤. ╥αΩµσ ΓΩδ■≈σφ√ ±±√δΩΦ Φ ßΦßδΦεπ≡α⌠Φ . ─ε±≥≤∩σφ Γ ε∩σ≡α≥ΦΓφε∞ ≡σµΦ∞σ φα ⌡ε±≥σ ftp.nisc.sri.com, ΣΦ≡σΩ≥ε≡ΦΦ rfc, ⌠αΘδσ rfc1135.txt. ╥αΩµσ Σε±≥≤∩σφ φα ⌡ε±≥σ nis.nsf.net. ΣΦ≡σΩ≥ε≡ΦΦ RFC, ⌠αΘδσ RFC1135.TXT-1.

[SEELEY89]
Seeley, D., "A Tour of the Worm", Proceedings of 1989 Winter USENIX Conference, Usenix Association, San Diego, CA, February 1989.

─σ≥αδⁿφεσ ε∩Φ±αφΦσ ∩≡σΣ±≥αΓδσφε Γ ΓΦΣσ ∩≡επ≤δΩΦ ∩ε ∩≡επ≡α∞∞σ. ▌≥α ±≥α≥ⁿ  ±ε±≥εΦ≥ Φτ εß∙σπε ∩≡σΣ±≥αΓδσφΦ , ΓΓσΣσφΦ , Σσ≥αδⁿφεΘ ⌡≡εφεδεπΦΦ ±εß√≥ΦΘ ∩ε±δσ εßφα≡≤µσφΦ  ≈σ≡Γ , εßτε≡α ≈σ≡Γ , σπε ±εΣσ≡µαφΦ , ∞φσφΦΘ ≤≈α±≥φΦΩεΓ ±εß√≥ΦΘ Φ ταΩδ■≈σφΦ .

[SPAFFORD88]
Spafford, E., "The Internet Worm Program: An Analysis", Computer Communication Review, Vol. 19, No. 1, ACM SIGCOM, January 1989. Also issued as Purdue CS Technical Report CSD-TR-823, 28 November 1988.

╬∩Φ±√Γασ≥ τα≡αµσφΦσ ╚φ≥σ≡φσ≥α ∩≡επ≡α∞∞εΘ-≈σ≡Γσ∞, Ωε≥ε≡α  Φ±∩εδⁿτ≤σ≥ ≤ τΓΦ∞√σ ∞σ±≥α Γ ≤≥ΦδΦ≥α⌡ Unixα. ▌≥ε≥ ε≥≈σ≥ ±εΣσ≡µΦ≥ Σσ≥αδⁿφεσ ε∩Φ±αφΦσ Ωε∞∩εφσφ≥ ∩≡επ≡α∞∞√-≈σ≡Γ : σσ Σαφφ√⌡ Φ ⌠≤φΩ÷ΦΘ. ╤∩α⌠⌠ε≡Σ ±ε±≡σΣε≥α≈ΦΓασ≥ ±Γεσ Φ±±δσΣεΓαφΦσ φα ΣΓ≤⌡ ∩εδφε±≥ⁿ■ φσταΓΦ±Φ∞√⌡ Γσ≡±Φ ⌡ ≡σα±±σ∞ßδΦ≡εΓαφφεπε ≈σ≡Γ  Φ Γσ≡±ΦΦ, ΣΦτα±±σ∞ßδΦ≡εΓαφφεΘ φα α±±σ∞ßδσ≡σ VAXα.

[SPAFFORD89]
Spafford, G., "An Analysis of the Internet Worm", Proceedings of the European Software Engineering Conference 1989, Warwick England, September 1989. Proceedings published by Springer-Verlag as: Lecture Notes in Computer Science #387. Also issued as Purdue Technical Report #CSD-TR-933.

═αταΣ | ╤εΣσ≡µαφΦσ | ┬∩σ≡σΣ