期刊文献+

Instant Messaging Worms Propagation Simulation and Countermeasures 被引量:2

Instant Messaging Worms Propagation Simulation and Countermeasures
下载PDF
导出
摘要 Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The increasing popularity and functionalities of IM programs have made it increasingly attractive for attackers, especially for worm writers. IM contact list offers worm an easy way of finding potential victims so that the worm could achieve a surprising spreading speed. This paper first presents our experimental results of simulating IM worm propagation in the logical network defined by IM contact lists, which is reported to be a scale-free network. Then, the existing proposals for detecting and containing IM worm epidemics are discussed. At last, a new algorithm for this purpose is presented, which is based on the observation of the bi-directional nature of IM worm traffic, and its advantages and possible improvements in implementation are analyzed. The simulation results show the proposed algorithm is of significant effect on restricting IM worm propagation. Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The increasing popularity and functionalities of IM programs have made it increasingly attractive for attackers, especially for worm writers. IM contact list offers worm an easy way of finding potential victims so that the worm could achieve a surprising spreading speed. This paper first presents our experimental results of simulating IM worm propagation in the logical network defined by IM contact lists, which is reported to be a scale-free network. Then, the existing proposals for detecting and containing IM worm epidemics are discussed. At last, a new algorithm for this purpose is presented, which is based on the observation of the bi-directional nature of IM worm traffic, and its advantages and possible improvements in implementation are analyzed. The simulation results show the proposed algorithm is of significant effect on restricting IM worm propagation.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期95-100,共6页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (60573136)
关键词 instant messaging worms SIMULATION PROPAGATION worm detection and containment instant messaging worms simulation propagation worm detection and containment
  • 相关文献

参考文献10

  • 1Tian Bu,Towsley D.On Distinguishing between Internet Power Law Topology Generators[].Infocom.2002
  • 2Zou C C,Towsley D,Gong Weibo.Email Virus Propagation Modeling and Analysis. http://tennis. ecs. umass. edu/~czou/research/ emailvirus-techreport. pdf . 2006
  • 3Frauenthal J C.Mathematical Modeling[].Epidemiology.1980
  • 4Chen X,Heidemann J.Detecting Early Worm Propagation Through Packet Matching. http:// www.isi. edu/div7/publication_files/ Chen04a.pdf . 2006
  • 5Ediger B.Simulating Network Worms. http://www. users. qwest. net/~eballen1/ nws/ . 2006
  • 6Williamson M M,Parry A,Byde A.Virus Throttling for Instant Messaging[].Virus Bulletin Conference.2004
  • 7IMlogic Threat Center.2005 Real-Time CommunicationSecurity: The Year in Review. http://www.imlogic.com/pdf/2005 ThreatCenter_report. pdf . 2006
  • 8Mannan M,van Oorschot P C.On Instant Messaging Worms, Analysis and Countermeasures[].WORM’.2005
  • 9Zou C C,Gong W,Towsley D.Code Red Worm Propagation Modeling and Analysis[].th ACM Conference on Computer and Communication Security.2002
  • 10Smith R D.Instant Messaging as a Scale-Free Network. http://arxiv.org/abs/cond-mat/ 0206378 . 2006

同被引文献16

  • 1罗军宏,张有为,谢余强,舒辉.受控蠕虫框架结构研究[J].计算机应用研究,2006,23(8):74-75. 被引量:2
  • 2于少山,卡米力.毛依丁.基于XML的即时通信系统的研究与实现[J].重庆邮电大学学报(自然科学版),2007,19(B06):59-61. 被引量:8
  • 3张文茂,章淼,毕军,覃征.互联网即时消息(Instant Messaging,IM)的研究现状与展望[J].小型微型计算机系统,2007,28(7):1162-1168. 被引量:25
  • 4Ma J,Voelker G,Savage S.Self-Stopping Worms[C] //Proc.of the 2005 ACM Workshop on Rapid Malcode.New York:ACM Press,2005:12-21.
  • 5Zou C C,Gong W,Towsley D.Code red worm propagation modeling and analysis[C] //Proc.of the 9th ACM Conf.on Computer and Communications Security (CCS 2002).New York:ACM Press,2002:138-147.
  • 6Kim J,Radhakrishnan S,Dhall S K.Measurement and analysis of worm propagation on internet network topology[C] //Proc.of the IEEE Int'l Conf.on Computer Communications and Networks (ICCCN 2004).[s.l.] :[s.n.] ,2004:495-500.
  • 7Zou C C,Gong W,Towsley D.Worm propagation modeling and analysis under dynamic quarantine defense[C] //Proc.of the ACM CCS Workshop on Rapid Malcode (WORM 2003).New York:ACM Press,2003:51-60.
  • 8Zou C C,Towsley D,Gong Weibo.Email Worm Modeling and Defense[C] //Proceedings of 13th International Conference on Computer Communications and Networks.[s.l.] :[s.n.] ,2004:409-414.
  • 9Zhou Ying,Wu Zhongfu,Ye Chunxiao,et al.Proactive Worm Prevention Based on P2P Networks[C] //IET International Conference on Wireless Mobile and Multimedia Networks Proceedings.Hangzhou,China:[s.n.] ,2006:405-406.
  • 10崔惠鹏.良性网络蠕虫研究与进展[J].计算机与数字工程,2007,35(10):77-79. 被引量:1

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部