Fig 1.
The architecture of RDAM.
Fig 2.
Flow chart of Algorithm 1.
Fig 3.
Communication between internal hosts.
Fig 4.
Communication of an external host requesting a public host’s service.
Fig 5.
The ratio of hosts missed by repeatable scanners.
(A) Scan domain names. (B) Scan IP addresses.
Fig 6.
The ratio of hosts missed by non-repeat scanners in uniform mutation.
(A) Scan domain names. (B) Scan IP addresses.
Fig 7.
The ratio of hosts missed by non-repeat scanners in failure-prior mutation.
(A) Scan domain names. (B) Scan IP addresses.
Fig 8.
Propagation of worms based on IP address and domain name scanning.
Fig 9.
Flow table lengths for different session establishment rates.
Table 1.
Operation delay with and without RDAM.