ABSTRACT

Although worms have evolved from both technological and

social engineering perspectives, there has been little change

in the basic method of propagation-the initial scanning

phase in which the worm looks for the vulnerable hosts.

Once a worm reaches an installation base of 10,000 or more

hosts, propagation becomes exponentially faster. In virtually

all cases to date, worms have been slow to find the initial

10,000 or so exploitable hosts. During this scanning phase,

worms produce quite a bit of “noise” as they scan random

address ranges across the Internet, looking for targets. This

causes firewalls and intrusion detection system (IDS) sys-

tems to generate alerts and serves as an early warning that a

new worm is winding its malicious way across the Internet.