Optimal worm-scanning method using vulnerable-host distributions

@article{Chen2007OptimalWM,
  title={Optimal worm-scanning method using vulnerable-host distributions},
  author={Zesheng Chen and Chuanyi Ji},
  journal={IJSN},
  year={2007},
  volume={2},
  pages={71-80}
}
Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random scanning wastes many scans on invulnerable addresses, and more virulent scanning schemes may take advantage of the non-uniformity of a vulnerablehost distribution. Questions then arise as to how attackers may exploit such information and how virulent the resulting worm may be. These issues provide “worst-case scenarios… CONTINUE READING
Highly Cited
This paper has 66 citations. REVIEW CITATIONS

6 Figures & Tables

Topics

Statistics

051015'07'08'09'10'11'12'13'14'15'16'17'18
Citations per Year

67 Citations

Semantic Scholar estimates that this publication has 67 citations based on the available data.

See our FAQ for additional information.