Title of article :
On the performance of Internet worm scanning strategies
Author/Authors :
Zou، نويسنده , , Cliff C. and Towsley، نويسنده , , Don and Gong، نويسنده , , Weibo، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2006
Pages :
24
From page :
700
To page :
723
Abstract :
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend against future worms, it is important to first understand how worms propagate and how different scanning strategies affect worm propagation dynamics. In this paper, we systematically model and analyze worm propagation under various scanning strategies, such as uniform scan, routing scan, hit-list scan, cooperative scan, local preference scan, sequential scan, divide-and-conquer scan, target scan, etc. We also provide an analytical model to accurately model Witty worm’s destructive behavior. By using the same modeling framework, we reveal the underlying similarity and relationship between different worm scanning strategies. In addition, based on our simulation and analysis of Blaster worm propagation and monitoring, we provide a guideline for building a better worm monitoring infrastructure.
Keywords :
Worm scanning strategy , Worm modeling , network security , network monitoring
Journal title :
Performance Evaluation
Serial Year :
2006
Journal title :
Performance Evaluation
Record number :
1569934
Link To Document :
بازگشت