Computer viruses: theory and experiments
Computers and Security
IEEE Spectrum
Probability and statistics with reliability, queuing and computer science applications
Probability and statistics with reliability, queuing and computer science applications
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
On computer viral infection and the effect of immunization
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Measuring and Modeling Computer Virus Prevalence
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Monitoring and early warning for internet worms
Proceedings of the 10th ACM conference on Computer and communications security
Proceedings of the 2004 ACM workshop on Rapid malcode
On the performance of internet worm scanning strategies
Performance Evaluation
Coupled kermack-mckendrick models for randomly scanning and bandwidth-saturating internet worms
QoS-IP'05 Proceedings of the Third international conference on Quality of Service in Multiservice IP Networks
A Distributed Framework for the Detection of New Worm-Related Malware
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
SISR --- A New Model for Epidemic Spreading of Electronic Threats
ISC '09 Proceedings of the 12th International Conference on Information Security
Virus Propagation and Immunization Strategies in Email Networks
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
A Distributed Immunization Strategy Based on Autonomy-Oriented Computing
ISMIS '09 Proceedings of the 18th International Symposium on Foundations of Intelligent Systems
Towards controlling virus propagation in information systems with point-to-group information sharing
Decision Support Systems
A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks
IEEE Network: The Magazine of Global Internetworking
A novel dynamic immunization model basing on alarm information
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Detecting and blocking P2P botnets through contact tracing chains
International Journal of Internet Protocol Technology
Fundamenta Informaticae - Methodologies for Intelligent Systems
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Toward worm detection in online social networks
Proceedings of the 26th Annual Computer Security Applications Conference
Optimal response to attacks on the open science grid
Computer Networks: The International Journal of Computer and Telecommunications Networking
Adaptive immunization in dynamic networks
ISMIS'11 Proceedings of the 19th international conference on Foundations of intelligent systems
Poster: online spam filtering in social networks
Proceedings of the 18th ACM conference on Computer and communications security
Secure instant messaging in enterprise-like networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
As many people rely on e-mail communications for business and everyday life, Internet e-mail worms constitute one of the major security threats for our society. Unlike scanning worms such as Code Red or Slammer, e-mail worms spread over a logical network defined by e-mail address relationships, making traditional epidemic models invalid for modeling the propagation of e-mail worms. In addition, we show that the topological epidemic models presented in [1], [2], [3], and [4] largely overestimate epidemic spreading speed in topological networks due to their implicit homogeneous mixing assumption. For this reason, we rely on simulations to study e-mail worm propagation in this paper. We present an e-mail worm simulation model that accounts for the behaviors of e-mail users, including e-mail checking time and the probability of opening an e-mail attachment. Our observations of e-mail lists suggest that an Internet e-mail network follows a heavy-tailed distribution in terms of node degrees, and we model it as a power-law network. To study the topological impact, we compare e-mail worm propagation on power-law topology with worm propagation on two other topologies: small-world topology and random-graph topology. The impact of the power-law topology on the spread of e-mail worms is mixed: E-mail worms spread more quickly on a power-law topology than on a small-world topology or a random-graph topology, but immunization defense is more effective on a power-law topology.