ACT: attachment chain tracing scheme for email virus detection and control
Proceedings of the 2004 ACM workshop on Rapid malcode
An Algorithmic Approach for Sensitivity Analysis of Perturbed Quasi-Birth-and-Death Processes
Queueing Systems: Theory and Applications
Securing Email Archives through User Modeling
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
A Multilayer Approach of Anomaly Detection for Email Systems
ISCC '06 Proceedings of the 11th IEEE Symposium on Computers and Communications
A Social View on Unsolicited Bulk Email Impacts on Mobile Mail Addresses
PDCAT '06 Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies
Short Term and Total Life Impact analysis of email worms in computer systems
Decision Support Systems
Protecting people from phishing: the design and evaluation of an embedded training email system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A queueing analysis for the denial of service (DoS) attacks in computer networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure Emails in XML Format Using Web Services
ECOWS '07 Proceedings of the Fifth European Conference on Web Services
An Empirical Study of Spam and Spam Vulnerable email Accounts
FGCN '07 Proceedings of the Future Generation Communication and Networking - Volume 01
Addressing email loss with SureMail: measurement, design, and evaluation
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Constructive Computation in Stochastic Models with Applications: The RG-Factorizations
Constructive Computation in Stochastic Models with Applications: The RG-Factorizations
Performance and security tradeoff
SFM'10 Proceedings of the Formal methods for quantitative aspects of programming languages, and 10th international conference on School on formal methods for the design of computer, communication and software systems
Modeling computer virus with the BSDE approach
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Email is a crucial part of our daily life, but email systems are facing increasing security threats such as attacks and spam. Because of this, new mechanisms are being provided to defend against the attacks and to reduce the amount of spam in email systems. Up to now, few available works have been reported on the performance evaluation of email systems under attack, which has become necessary for enhancing email security. In this paper, we propose a novel method to study the impact of three types of attacks on email systems. We construct a multiple queueing model to characterize three types of attacks integrally, and study the performance metrics of system security such as system availability, average queue length and information leakage probability. Numerical examples indicate that the approach of this paper is effective and efficient for dealing with the security analysis of email systems under attack. We believe that this work will open a new avenue for the performance evaluation of computer networks under email attack and other forms of attacks.