资源描述:
《modeling and simulation study of the propagation and defense of internet email wormnew》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、1ModelingandSimulationStudyofthePropagationandDefenseofInternetEmailWormCliffC.Zou∗,DonTowsley‡,WeiboGong†∗SchoolofElectricalEngineeringandComputerScienceUniversityofCentralFlorida,OrlandoFL‡DepartmentofComputerScience,UniversityofMassachusetts,Amhers
2、tMA†DepartmentofElectrical&ComputerEngineering,UniversityofMassachusetts,AmherstMAczou@cs.ucf.edu,gong@ecs.umass.edu,towsley@cs.umass.eduAbstractAsmanypeoplerelyonemailcommunicationsforlongasitcanreplicateandpropagatebysendingcopiesofbusinessandeveryd
3、aylife,Internetemailwormsconstituteoneitselfthroughemailmessages.ofthemajorsecuritythreatsforoursociety.UnlikescanningAlthoughspreadingmaliciouscodesthroughemailisanoldwormssuchasCodeRedorSlammer,emailwormsspreadoveralogicalnetworkdefinedbyemailaddress
4、relationship,makingtechnique,itisstilleffectiveandiswidelyusedbycurrenttraditionalepidemicmodelsinvalidformodelingthepropagationattackers.Sendingmaliciouscodesthroughemailhassomeofemailworms.Inaddition,weshowthatthetopologicaladvantagesthatareattracti
5、vetoattackers:epidemicmodelspresentedin[1],[2],[3],[4]largelyoverestimateepidemicspreadingspeedintopologicalnetworksduetotheir•Sendingmaliciouscodesthroughemaildoesnotrequireimplicithomogeneousmixingassumption.Forthisreason,werelyanysecurityholesincom
6、puteroperatingsystemsoronsimulationstostudyemailwormpropagationinthispaper.software,makingiteasyforattackerstoprogramandWepresentanemailwormsimulationmodelthataccountsforthebehaviorsofemailusers,includingemailcheckingtimeandreleasetheirmaliciouscodes.
7、theprobabilityofopeninganemailattachment.Ourobservations•Almosteveryonewhousescomputersusesemailservice.ofemaillistssuggestthatanInternetemailnetworkfollowsa•Alargenumberofusershavelittleknowledgeofemailheavy-taileddistributionintermsofnodedegrees,and
8、wemodelwormsandtrustmostemailtheyreceive,especiallyemailitasapowerlawnetwork.Tostudythetopologicalimpact,fromtheirfriends[7].wecompareemailwormpropagationonpowerlawtopologywithwormpropagationontwoothertopologies:smallworldInordertounderstandho