modeling and simulation study of the propagation and defense of internet email wormnew

modeling and simulation study of the propagation and defense of internet email wormnew

ID:34514574

大小:480.90 KB

頁數(shù):14頁

時間:2019-03-07

modeling and simulation study of the propagation and defense of internet email wormnew_第1頁
modeling and simulation study of the propagation and defense of internet email wormnew_第2頁
modeling and simulation study of the propagation and defense of internet email wormnew_第3頁
modeling and simulation study of the propagation and defense of internet email wormnew_第4頁
modeling and simulation study of the propagation and defense of internet email wormnew_第5頁
資源描述:

《modeling and simulation study of the propagation and defense of internet email wormnew》由會員上傳分享,免費在線閱讀,更多相關內容在教育資源-天天文庫

1、1ModelingandSimulationStudyofthePropagationandDefenseofInternetEmailWormCliffC.Zou?,DonTowsley?,WeiboGong??SchoolofElectricalEngineeringandComputerScienceUniversityofCentralFlorida,OrlandoFL?DepartmentofComputerScience,UniversityofMassachusetts,Amhers

2、tMA?DepartmentofElectrical&ComputerEngineering,UniversityofMassachusetts,AmherstMAczou@cs.ucf.edu,gong@ecs.umass.edu,towsley@cs.umass.eduAbstractAsmanypeoplerelyonemailcommunicationsforlongasitcanreplicateandpropagatebysendingcopiesofbusinessandeveryd

3、aylife,Internetemailwormsconstituteoneitselfthroughemailmessages.ofthemajorsecuritythreatsforoursociety.UnlikescanningAlthoughspreadingmaliciouscodesthroughemailisanoldwormssuchasCodeRedorSlammer,emailwormsspreadoveralogicalnetworkde?nedbyemailaddress

4、relationship,makingtechnique,itisstilleffectiveandiswidelyusedbycurrenttraditionalepidemicmodelsinvalidformodelingthepropagationattackers.Sendingmaliciouscodesthroughemailhassomeofemailworms.Inaddition,weshowthatthetopologicaladvantagesthatareattracti

5、vetoattackers:epidemicmodelspresentedin[1],[2],[3],[4]largelyoverestimateepidemicspreadingspeedintopologicalnetworksduetotheir?Sendingmaliciouscodesthroughemaildoesnotrequireimplicithomogeneousmixingassumption.Forthisreason,werelyanysecurityholesincom

6、puteroperatingsystemsoronsimulationstostudyemailwormpropagationinthispaper.software,makingiteasyforattackerstoprogramandWepresentanemailwormsimulationmodelthataccountsforthebehaviorsofemailusers,includingemailcheckingtimeandreleasetheirmaliciouscodes.

7、theprobabilityofopeninganemailattachment.Ourobservations?Almosteveryonewhousescomputersusesemailservice.ofemaillistssuggestthatanInternetemailnetworkfollowsa?Alargenumberofusershavelittleknowledgeofemailheavy-taileddistributionintermsofnodedegrees,and

8、wemodelwormsandtrustmostemailtheyreceive,especiallyemailitasapowerlawnetwork.Tostudythetopologicalimpact,fromtheirfriends[7].wecompareemailwormpropagationonpowerlawtopologywithwormpropagationontwoothertopologies:smallworldInordertounderstandho

當前文檔最多預覽五頁,下載文檔查看全文

此文檔下載收益歸作者所有

當前文檔最多預覽五頁,下載文檔查看全文
溫馨提示:
1. 部分包含數(shù)學公式或PPT動畫的文件,查看預覽時可能會顯示錯亂或異常,文件下載后無此問題,請放心下載。
2. 本文檔由用戶上傳,版權歸屬用戶,天天文庫負責整理代發(fā)布。如果您對本文檔版權有爭議請及時聯(lián)系客服。
3. 下載前請仔細閱讀文檔內容,確認文檔內容符合您的需求后進行下載,若出現(xiàn)內容與標題不符可向本站投訴處理。
4. 下載文檔時可能由于網(wǎng)絡波動等原因無法下載或下載錯誤,付費完成后未能成功下載的用戶請聯(lián)系客服處理。