Internet worms have been a significant security threat. Divide-conquer scanning is a simple yet effective technique that can potentially be exploited by future Internet epidemics. Therefore, it is imperative that defenders understand the characteristics of divide-conquer-scanning worms and study the countermeasures. In this work, we first provide the intuitions that a divide-conquer-scanning worm can potentially spread faster and stealthier than a traditional random-scanning worm. We then characterize the relationships between the propagation speeds of divide-conquer-scanning worms and the distributions of vulnerable hosts through mathematical analysis and simulations. Specifically, we find that if vulnerable hosts follow a non-uniform dist...
Since the days of the Morris worm, the spread of malicious code has been the most imminent menace to...
Infections by malicious software, such as Internet worms, spreading on computer net-works can have d...
AbstractIt is commonly believed that the IPv6 provides greater security against worms by its huge ad...
Internet worms are a significant security threat. Divide-conquer scanning is a simple yet effective ...
the major threats to the security of the Internet. In order to defend against future worms, it is im...
Abstract Localized scanning is a simple technique used by attackers to search for vulnerable hosts....
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become on...
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become on...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
This paper examines the general behaviour of stealthy worms. In particular, we focus on worms that a...
There are the two common means for propagating worms: scanning vulnerable computers in the network a...
As computer and communication networks become prevalent, the Internet has been a battlefield for att...
Recently, active worms have done significant damage due to their rapid propagation over the Internet...
Worm propagation models are important for understanding worm dynamics and designing effective and ef...
Recently, active worms such as the Code Red worm of 2001 and the Slammer worm of 2003, both of which...
Since the days of the Morris worm, the spread of malicious code has been the most imminent menace to...
Infections by malicious software, such as Internet worms, spreading on computer net-works can have d...
AbstractIt is commonly believed that the IPv6 provides greater security against worms by its huge ad...
Internet worms are a significant security threat. Divide-conquer scanning is a simple yet effective ...
the major threats to the security of the Internet. In order to defend against future worms, it is im...
Abstract Localized scanning is a simple technique used by attackers to search for vulnerable hosts....
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become on...
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become on...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
This paper examines the general behaviour of stealthy worms. In particular, we focus on worms that a...
There are the two common means for propagating worms: scanning vulnerable computers in the network a...
As computer and communication networks become prevalent, the Internet has been a battlefield for att...
Recently, active worms have done significant damage due to their rapid propagation over the Internet...
Worm propagation models are important for understanding worm dynamics and designing effective and ef...
Recently, active worms such as the Code Red worm of 2001 and the Slammer worm of 2003, both of which...
Since the days of the Morris worm, the spread of malicious code has been the most imminent menace to...
Infections by malicious software, such as Internet worms, spreading on computer net-works can have d...
AbstractIt is commonly believed that the IPv6 provides greater security against worms by its huge ad...