A worm misuse pattern

Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Abstract

    We have proposed a new type of pattern, the misuse pattern. This pattern describes, from the point of view of the attacker, how a type of attack or misuse is performed (what system units it uses and how); it also provides ways of stopping the attack by enumerating possible security patterns that can be applied for this purpose, and helps analyzing the attack once it has happened by indicating where can we find forensics data as well as what type of data. A catalog of misuse patterns is needed to let designers evaluate their designs with respect to possible threats. We present here a misuse pattern for a generic worm, which describes the essential and typical characteristics of this type of malware. We consider how to stop this malware and we also discuss some examples and variations.

    Original languageEnglish
    Title of host publicationACM International Conference Proceeding Series
    DOIs
    Publication statusPublished - 2010
    Event1st Asian Conference on Pattern Languages of Programs, AsianPLoP 2010 - Tokyo
    Duration: 2010 Mar 162010 Mar 17

    Other

    Other1st Asian Conference on Pattern Languages of Programs, AsianPLoP 2010
    CityTokyo
    Period10/3/1610/3/17

    Fingerprint

    Malware

    Keywords

    • Computer security
    • Misuse patterns
    • Viruses and worms

    ASJC Scopus subject areas

    • Human-Computer Interaction
    • Computer Networks and Communications
    • Computer Vision and Pattern Recognition
    • Software

    Cite this

    Fernandez, E. B., Yoshioka, N., & Washizaki, H. (2010). A worm misuse pattern. In ACM International Conference Proceeding Series https://doi.org/10.1145/2371736.2371739

    A worm misuse pattern. / Fernandez, Eduardo B.; Yoshioka, Nobukazu; Washizaki, Hironori.

    ACM International Conference Proceeding Series. 2010.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fernandez, EB, Yoshioka, N & Washizaki, H 2010, A worm misuse pattern. in ACM International Conference Proceeding Series. 1st Asian Conference on Pattern Languages of Programs, AsianPLoP 2010, Tokyo, 10/3/16. https://doi.org/10.1145/2371736.2371739
    Fernandez EB, Yoshioka N, Washizaki H. A worm misuse pattern. In ACM International Conference Proceeding Series. 2010 https://doi.org/10.1145/2371736.2371739
    Fernandez, Eduardo B. ; Yoshioka, Nobukazu ; Washizaki, Hironori. / A worm misuse pattern. ACM International Conference Proceeding Series. 2010.
    @inproceedings{8c1d40af316c44df91f39a1b5a9f0395,
    title = "A worm misuse pattern",
    abstract = "We have proposed a new type of pattern, the misuse pattern. This pattern describes, from the point of view of the attacker, how a type of attack or misuse is performed (what system units it uses and how); it also provides ways of stopping the attack by enumerating possible security patterns that can be applied for this purpose, and helps analyzing the attack once it has happened by indicating where can we find forensics data as well as what type of data. A catalog of misuse patterns is needed to let designers evaluate their designs with respect to possible threats. We present here a misuse pattern for a generic worm, which describes the essential and typical characteristics of this type of malware. We consider how to stop this malware and we also discuss some examples and variations.",
    keywords = "Computer security, Misuse patterns, Viruses and worms",
    author = "Fernandez, {Eduardo B.} and Nobukazu Yoshioka and Hironori Washizaki",
    year = "2010",
    doi = "10.1145/2371736.2371739",
    language = "English",
    isbn = "9781450301268",
    booktitle = "ACM International Conference Proceeding Series",

    }

    TY - GEN

    T1 - A worm misuse pattern

    AU - Fernandez, Eduardo B.

    AU - Yoshioka, Nobukazu

    AU - Washizaki, Hironori

    PY - 2010

    Y1 - 2010

    N2 - We have proposed a new type of pattern, the misuse pattern. This pattern describes, from the point of view of the attacker, how a type of attack or misuse is performed (what system units it uses and how); it also provides ways of stopping the attack by enumerating possible security patterns that can be applied for this purpose, and helps analyzing the attack once it has happened by indicating where can we find forensics data as well as what type of data. A catalog of misuse patterns is needed to let designers evaluate their designs with respect to possible threats. We present here a misuse pattern for a generic worm, which describes the essential and typical characteristics of this type of malware. We consider how to stop this malware and we also discuss some examples and variations.

    AB - We have proposed a new type of pattern, the misuse pattern. This pattern describes, from the point of view of the attacker, how a type of attack or misuse is performed (what system units it uses and how); it also provides ways of stopping the attack by enumerating possible security patterns that can be applied for this purpose, and helps analyzing the attack once it has happened by indicating where can we find forensics data as well as what type of data. A catalog of misuse patterns is needed to let designers evaluate their designs with respect to possible threats. We present here a misuse pattern for a generic worm, which describes the essential and typical characteristics of this type of malware. We consider how to stop this malware and we also discuss some examples and variations.

    KW - Computer security

    KW - Misuse patterns

    KW - Viruses and worms

    UR - http://www.scopus.com/inward/record.url?scp=84867699275&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84867699275&partnerID=8YFLogxK

    U2 - 10.1145/2371736.2371739

    DO - 10.1145/2371736.2371739

    M3 - Conference contribution

    SN - 9781450301268

    BT - ACM International Conference Proceeding Series

    ER -