DocumentCode
150077
Title
Target discovery schemes used by an internet worm
Author
Yadav, Suneel
Author_Institution
Dept. of Comput. Sci. & Eng., Ambedkar Inst. of Adv. Commun. Technol. & Res., Delhi, India
fYear
2014
fDate
5-7 March 2014
Firstpage
776
Lastpage
779
Abstract
Worms are common phenomenon in today´s internet and cause tens of billions of dollars in damages to business around the world each year. In this study author first discuss about Worms, then gave a life-cycle of worm and a brief discussion about different stages of worm life cycle. Finally author gave a broad overview of target finding schemes (blind scan, hit-list and passive scheme) and finally made a comparison between various target finding schemes based on three parameters (no. of initially infected hosts, scan rate and hitting probability). This article explores all the current schemes used by internet worm to discover their victim host. This article is efficient both in research point of view as well as for the benefit of students because a vast list of target finding schemes used by worms discussed here.
Keywords
Internet; computer network security; invasive software; Internet worm; blind scan scheme; hit-list scheme; hitting probability; initially infected hosts; passive scheme; scan rate; target discovery schemes; target finding scheme; worm life-cycle; Computer worms; Conferences; Grippers; IP networks; Internet; Routing protocols; internet security; target finding schemes; worm; worm containment;
fLanguage
English
Publisher
ieee
Conference_Titel
Computing for Sustainable Global Development (INDIACom), 2014 International Conference on
Conference_Location
New Delhi
Print_ISBN
978-93-80544-10-6
Type
conf
DOI
10.1109/IndiaCom.2014.6828068
Filename
6828068
Link To Document