14.04.2015 Views

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Nodes 83<br />

ever, the language <strong>of</strong> biology quickly became a provocative tool for<br />

describing these encapsulations <strong>of</strong> code. Science fiction classics such<br />

as John Brunner’s <strong>The</strong> Shockwave Rider popularized the vitalism <strong>of</strong><br />

computer viruses, and by the early 1980s, researchers such as Fred<br />

Cohen published articles on “computer viruses” in academic journals<br />

such as Computers and Security. 62<br />

In terms <strong>of</strong> understanding networks, one <strong>of</strong> the greatest lessons <strong>of</strong> computer<br />

viruses and their cousins (Internet worms, Trojan horses) is that, like<br />

biological viruses, they exploit the normal functioning <strong>of</strong> their host systems<br />

to produce more copies <strong>of</strong> themselves. Viruses are life exploiting life.<br />

Standard computer viruses essentially do three things: they “infect”<br />

documents or a program by overwriting, replacing, or editing code;<br />

they use the host system to create copies and to distribute copies<br />

<strong>of</strong> themselves; and they may have one or more tactics for evading<br />

detection by users or antivirus programs.<br />

Contrary to popular opinion, not all computer viruses are destructive<br />

(the same can be said in biology, as well). Certainly computer<br />

viruses can delete data, but they can also be performative (e.g., demonstrating<br />

a security violation), exploratory (e.g., gaining access), or<br />

based on disturbance rather than destruction (e.g., rerouting network<br />

traffic, clogging network bandwidth). Originally computer viruses<br />

operated in one computer system at a time and required external media<br />

such as a floppy disk to pass from computer to computer. <strong>The</strong><br />

increasing popularity <strong>of</strong> the civilian Internet, and later the Web,<br />

made possible network - based, self - replicating computer viruses (or<br />

“worms”). For instance, in January 2003, the “Sobig.F” virus, which<br />

used e - mail address books, generated an estimated one hundred million<br />

“fake” e - mails (which amounted to one in seventeen e - mails<br />

being infected in a given day). That same year, the “Blaster” virus<br />

rapidly spread through the Internet, infecting some four hundred<br />

thousand operating systems—all running Micros<strong>of</strong>t Windows. An<br />

attempt was made to release an automated anti - Blaster “vaccine”<br />

called “Naachi”; but the attempt failed, as the purported fix clogged<br />

networks with downloads <strong>of</strong> the Blaster patch from the Micros<strong>of</strong>t<br />

Web site (temporarily disabling a portion <strong>of</strong> the Air Canada and the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!