Hackers have tried various scanning strategies intheir scan-based worms
Uniform scan Code Red, Slammer
Local preference scan Code Red II
Sequential scan Blaster
Possible scanning strategies:
Target preference scan (selective attack from a routing worm)
Divide-and-conquer scan
How do they affect a worm’s propagation?
Mean value analysis (based on law of large number)
Numerical solutions; Simulation studies.