Title
On the performance of internet worm scanning strategies
Abstract
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend against future worms, it is important to first understand how worms propagate and how different scanning strategies affect worm propagation dynamics. In this paper, we systematically model and analyze worm propagation under various scanning strategies, such as uniform scan, routing scan, hit-list scan, cooperative scan, local preference scan, sequential scan, divide-and-conquer scan, target scan, etc. We also provide an analytical model to accurately model Witty worm's destructive behavior. By using the same modeling framework, we reveal the underlying similarity and relationship between different worm scanning strategies. In addition, based on our simulation and analysis of Blaster worm propagation and monitoring, we provide a guideline for building a better worm monitoring infrastructure.
Year
DOI
Venue
2006
10.1016/j.peva.2005.07.032
Performance Evaluation
Keywords
DocType
Volume
worm modeling,worm scanning strategy,analytical model,network monitoring,network security,internet worm,blaster worm propagation,future worm,worm propagation,systematically model,better worm monitoring infrastructure,worms propagate,model witty worm,worm propagation dynamic,different worm
Journal
63
Issue
ISSN
Citations 
7
Performance Evaluation
106
PageRank 
References 
Authors
6.34
19
3
Search Limit
100106
Name
Order
Citations
PageRank
Cliff C. Zou11475116.93
Don Towsley2186931951.05
Weibo Gong33225250.70