• DocumentCode
    150077
  • Title

    Target discovery schemes used by an internet worm

  • Author

    Yadav, Suneel

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Ambedkar Inst. of Adv. Commun. Technol. & Res., Delhi, India
  • fYear
    2014
  • fDate
    5-7 March 2014
  • Firstpage
    776
  • Lastpage
    779
  • Abstract
    Worms are common phenomenon in today´s internet and cause tens of billions of dollars in damages to business around the world each year. In this study author first discuss about Worms, then gave a life-cycle of worm and a brief discussion about different stages of worm life cycle. Finally author gave a broad overview of target finding schemes (blind scan, hit-list and passive scheme) and finally made a comparison between various target finding schemes based on three parameters (no. of initially infected hosts, scan rate and hitting probability). This article explores all the current schemes used by internet worm to discover their victim host. This article is efficient both in research point of view as well as for the benefit of students because a vast list of target finding schemes used by worms discussed here.
  • Keywords
    Internet; computer network security; invasive software; Internet worm; blind scan scheme; hit-list scheme; hitting probability; initially infected hosts; passive scheme; scan rate; target discovery schemes; target finding scheme; worm life-cycle; Computer worms; Conferences; Grippers; IP networks; Internet; Routing protocols; internet security; target finding schemes; worm; worm containment;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computing for Sustainable Global Development (INDIACom), 2014 International Conference on
  • Conference_Location
    New Delhi
  • Print_ISBN
    978-93-80544-10-6
  • Type

    conf

  • DOI
    10.1109/IndiaCom.2014.6828068
  • Filename
    6828068