吉林大学学报(工学版) ›› 2010, Vol. 40 ›› Issue (06): 1655-1662.

• paper • Previous Articles     Next Articles

Emailworm propagation with user behavior and network topology

LIU Yan-heng1,2,SUN Xin1,2,WANG Jian1,2,LI Wei-ping3,ZHU Jian-qi1,2   

  1. 1.College of Computer Science and Technology,Jilin University,Changchun 130012,China;2.Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education,Jilin University,Changchun 130012,China;3.Changchun JiLin University Information Technologies Co.,Ltd.,Changchun 130012,China
  • Received:2009-03-31 Online:2010-11-01 Published:2010-11-01
  • Supported by:

    国家自然科学基金项目(60973136);国家科技部国际合作与交流专项项目(2008DFA12140);“十一五”国家科技支撑计划项目(2008BAH22B02);吉林大学“985工程”研究生创新基金项目(20080235)

Abstract:

By introducing the effects of user behavior and network topology, a novel emailworm propagation simulation algorithm is presented. Also a practical simulation environment is established based on EnronEmailDataset for emailworm propagation simulation. Simulation results show that the proposed algorithm can describe the emailworm propagation behavior accurately. The impacts of network topology on emailworm propagation are analyzed and we found that the infected keynodes can speed up the worm propagation. Also four protection strategies are proposed and examined through experiments. Results show that the imposed protections on keynode can slower the worm propagation. Furthermore, a new emailworm propagation model, named TopoSIS, is built. Compared with the simulation results, this new model can predict the size of affected users accurately.

Key words: computer system organization, email worm propagation simulation, network topology, user behavior

CLC Number: 

  • TP309
[1] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[2] ZHAO Bo, QIN Gui-He, ZHAO Yong-Zhe, YANG Wen-Di. Public key cryptosystem based on semi-trapdoor one-way function [J]. 吉林大学学报(工学版), 2018, 48(1): 259-267.
[3] YU Bin-bin, WU Xin-yu, CHU Jian-feng, HU Liang. Signature protocol for wireless sensor network based on group key agreement [J]. 吉林大学学报(工学版), 2017, 47(3): 924-929.
[4] SHU Hao, SHI Jiang-yi, MA Pei-jun, PAN Wei-tao, YANG Lin-an. Torus-based shoot-through framework architecture for network-on-chip [J]. 吉林大学学报(工学版), 2017, 47(3): 988-995.
[5] WEI Xiao-hui, LI Xiang, LI Hong-liang, LI Cong, ZHUANG Yuan, YU Hong-mei. Flexible Online MapReduce model and topology protocols supporting large-scale stream data processing [J]. 吉林大学学报(工学版), 2016, 46(4): 1222-1231.
[6] CHE Xiang-jiu, LIANG Sen. Improved algorithm of SPIHT based on Max-Heap tree [J]. 吉林大学学报(工学版), 2016, 46(3): 865-869.
[7] WU Xiao, Nie Xiao, LIU Xiao-hui, GAO Shi-meng, QU Guan-nan, NIU Yan. Analysis of propagation characteristics of APPs based on weighted bipartite network [J]. 吉林大学学报(工学版), 2015, 45(6): 1946-1953.
[8] FU Shuai, MA Jian-feng, LI Hong-tao, WANG Chang-guang. Improved data aggregation algorithm based on clustered wireless sensor network [J]. 吉林大学学报(工学版), 2014, 44(4): 1118-1125.
[9] WEI Xiao-hui, ZOU Lei, LI Hong-liang. Virtual network embedding algorithm based on improved sub-graph isomorphism search [J]. 吉林大学学报(工学版), 2013, 43(01): 165-171.
[10] HU Liang, CHI Ling, YUAN Wei, CHU Jian-feng, XU Xiao-bo. Improvements against fault induction attack for RC4 algorithm [J]. , 2012, 42(05): 1231-1236.
[11] LIU San-min, SUN Zhi-xin. P2P traffic identification based on support vector data description [J]. , 2012, 42(04): 947-951.
[12] ZHANG Rui-Hua, CHENG He-You, JIA Zhi-Beng. Energyefficient clustering algorithm for wireless sensor networks [J]. 吉林大学学报(工学版), 2010, 40(06): 1663-1667.
[13] WEI Da, Gu-Xiang-Peng, WANG Jian, Liu-Yan-Hang. New access model and implementation of trusted network based on trusted certificate [J]. 吉林大学学报(工学版), 2010, 40(02): 496-0500.
[14] LIU Yan-Heng, SUN Lei, TIAN Da-Xin, WU Jing. Method of anomaly detection based on fusion principal components match [J]. 吉林大学学报(工学版), 2009, 39(05): 1314-1320.
[15] WANG Xiao-yan,LIU Shu-fen,YU Hai . Interface automata based approach to Web service composition [J]. 吉林大学学报(工学版), 2009, 39(03): 743-0748.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!