資源描述:
《modeling and simulation study of the propagation and defense of internet email wormnew》由會員上傳分享,免費在線閱讀,更多相關內容在教育資源-天天文庫。
1、1ModelingandSimulationStudyofthePropagationandDefenseofInternetEmailWormCliffC.Zou?,DonTowsley?,WeiboGong??SchoolofElectricalEngineeringandComputerScienceUniversityofCentralFlorida,OrlandoFL?DepartmentofComputerScience,UniversityofMassachusetts,Amhers
2、tMA?DepartmentofElectrical&ComputerEngineering,UniversityofMassachusetts,AmherstMAczou@cs.ucf.edu,gong@ecs.umass.edu,towsley@cs.umass.eduAbstractAsmanypeoplerelyonemailcommunicationsforlongasitcanreplicateandpropagatebysendingcopiesofbusinessandeveryd
3、aylife,Internetemailwormsconstituteoneitselfthroughemailmessages.ofthemajorsecuritythreatsforoursociety.UnlikescanningAlthoughspreadingmaliciouscodesthroughemailisanoldwormssuchasCodeRedorSlammer,emailwormsspreadoveralogicalnetworkde?nedbyemailaddress
4、relationship,makingtechnique,itisstilleffectiveandiswidelyusedbycurrenttraditionalepidemicmodelsinvalidformodelingthepropagationattackers.Sendingmaliciouscodesthroughemailhassomeofemailworms.Inaddition,weshowthatthetopologicaladvantagesthatareattracti
5、vetoattackers:epidemicmodelspresentedin[1],[2],[3],[4]largelyoverestimateepidemicspreadingspeedintopologicalnetworksduetotheir?Sendingmaliciouscodesthroughemaildoesnotrequireimplicithomogeneousmixingassumption.Forthisreason,werelyanysecurityholesincom
6、puteroperatingsystemsoronsimulationstostudyemailwormpropagationinthispaper.software,makingiteasyforattackerstoprogramandWepresentanemailwormsimulationmodelthataccountsforthebehaviorsofemailusers,includingemailcheckingtimeandreleasetheirmaliciouscodes.
7、theprobabilityofopeninganemailattachment.Ourobservations?Almosteveryonewhousescomputersusesemailservice.ofemaillistssuggestthatanInternetemailnetworkfollowsa?Alargenumberofusershavelittleknowledgeofemailheavy-taileddistributionintermsofnodedegrees,and
8、wemodelwormsandtrustmostemailtheyreceive,especiallyemailitasapowerlawnetwork.Tostudythetopologicalimpact,fromtheirfriends[7].wecompareemailwormpropagationonpowerlawtopologywithwormpropagationontwoothertopologies:smallworldInordertounderstandho