Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors

Given independent multiple access logs, we develop a mathematical model to identify the number of malicious hosts in the current Internet. In our model, the number of malicious hosts is formalized as a function taking two inputs, namely the duration of ob