%0 Journal Article
%T Analysis and Research of Internet Worm Scanning Strategies
网络蠕虫的扫描策略分析
%A WANG Fang-Wei
%A ZHANG Yun-Kai
%A WANG Chang-Guang
%A MA Jian-Feng
%A
王方伟
%A 张运凯
%A 王长广
%A 马建峰
%J 计算机科学
%D 2007
%I
%X Internet worms have severely threatened Internet security. In order to effectively defend against them, it is very important to understand the kinds of scanning strategies and how the scanning strategies affect worm propagation. A simple worm propagation model based on a discrete time differential equation is provided. The different scanning strategies used by Internet worms, such as uniform scan, Hit-list scan, routable scan, divide-and-conquer scan, local subnet scan, sequential scan, permutation scan are analyzed in detail based on the model provided, and given their corresponding models.
%K Internet worm
%K Scanning strategies
%K Propagation model
%K Malicious code
网络蠕虫
%K 扫描策略
%K 传播模型
%K 恶意代码
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=1E8759907DE654783BBF037F6A1030DC&yid=A732AF04DDA03BB3&vid=339D79302DF62549&iid=5D311CA918CA9A03&sid=03F1579EF92A5A32&eid=6270DC1B5693DDAF&journal_id=1002-137X&journal_name=计算机科学&referenced_num=0&reference_num=10