Sciweavers

IJSN
2007
73views more  IJSN 2007»
13 years 11 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
WORM
2004
14 years 28 days ago
The top speed of flash worms
Flash worms follow a precomputed spread tree using prior knowledge of all systems vulnerable to the worm's exploit. In previous work we suggested that a flash worm could satu...
Stuart Staniford, David Moore, Vern Paxson, Nichol...
USS
2008
14 years 1 months ago
All Your iFRAMEs Point to Us
As the web continues to play an ever increasing role in information exchange, so too is it becoming the prevailing platform for infecting vulnerable hosts. In this paper, we provi...
Niels Provos, Panayiotis Mavrommatis, Moheeb Abu R...
IPCCC
2007
IEEE
14 years 5 months ago
Understanding Localized-Scanning Worms
— Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search of vulnerable h...
Zesheng Chen, Chao Chen, Chuanyi Ji