Richard said:
Richard S. Westmoreland wrote:
[snip]
For the sake of the critique, let's
all pretend that Spam is both Malware and a Threat (security or
resource).
Accepting that, would you agree with the way the Triangle is laid out?
Do
you think this triangle can be useful in any way?
no... i criticized practically every relationship depicted there and so
far the only criticism that has been contentious was whether or not
spam qualified as malware...
Yes, I remember you saying something about viruses, worms, spyware, were all
trojans (did I get that right?).
no, i think someone else said that... however they can all fall under
the classification of trojan under the right circumstances...
So let's put the Spam issue aside for now and look at that. Let's try to
clearly define them.
Virus:
An executable code that injects itself into other executable codes as a
means of replicating itself.
'inject' isn't right... overwriting infectors don't inject their code
into a host (that would be like trying to shoot up with a sledge
hammer)... neither to companion infectors...
It executes without user intervention.
not necessarily... more often than not it will not run until the user
runs it...
[snip]
Worm:
An executable code that creates copies of itself. It's execution requires
user intervention.
not necessarily - blaster didn't require user intervention... nor did
slammer...
It spreads itself to other locations, i.e. file shares,
or via smtp to people's email addresses, or just other folders.
not all of them spread themselves to locations in the sense that most
people would expect... for example, slammer never got written to disk
(except maybe in the swap space)...
[snip]
Spyware:
An executable code that does not create copies of itself.
not necessarily - you're assuming mutual exclusivity between malware
sets for no good reason...
[snip]
Trojan:
An executable code that does not create copies of itself, but tends to work
in conjunction with viruses (which drop them).
ummm, no... trojan horse programs predate viruses by a wide margin,
they don't need to be dropped by them...
Trojans tend to mimick
legitimate programs to avoid detection.
?? that's pretty fuzzy, what exactly do you mean?
They open remote access to an
attacker or other automated program to pass commands to the system.
absolutely not - i already covered this the first time... you're
thinking of just one subset of trojans (remote access trojans)...
[snip]
Is there any fault in these definitions?
lots...
a virus is a self-replicating program that attaches itself to a host
program in such a way that when an attempt is made to execute the host,
the virus is executed as well as or instead of the host...
a worm is a self-replicating program that doesn't necessarily attach
itself to a host program (but some can - see klez.h)...
spyware is software that surreptitiously sends personal data about a
victim to a remote party...
a trojan is any program that does something undesirable as well as or
instead of the desirable thing the user was expecting it to do...
there is nothing that says any of these sets of objects are disjoint -
viruses and worms overlap in practice (and even in theory, the
mathematical definition of virus included worms), there have been
viruses that send personal information (pgp keys, keystroke logs, etc)
back to a remote party, and it seems pretty obvious that a virus
infected program can qualify as a trojan...