Abstract
Email worm has long been a critical but intractable threat to Internet users. In this paper, we propose an analytical model to present the propagation dynamics of email worms using difference equations. Based on this model, we further investigate the quarantine conditions for the number of infected users decreasing as soon as possible. In this field, previous works have found that a static threshold for worms fast dying out does not exist. In our work, we extend the modeling with dynamical quarantine processes to see if the previous viewpoint is still supported or not. By contrast, the results suggest that it is possible to have a sharp decline in the number of infected users within a short period of time. In the experiments, we implement both the empirical and theoretical methods to support our analysis. The work of this paper can provide practical values on protecting email networks.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Marc, F., Trevor, M., et al.: Symantec internet security threat report 2010. Technical report, Symantec Corporation (2011)
Ebel, H., Mielsch, L.I., Bornholdt, S.: Scale-free topology of e-mail networks. Phys. Rev. E 66, 035103 (2002)
Wang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic spreading in real networks: An eigenvalue viewpoint. In: Proceedings of SRDS, pp. 25–34 (2003)
Ganesh, A., Massoulie, L., Towsley, D.: The effect of network topology on the spread of epidemics. In: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2005, vol. 2, pp. 1455–1466. IEEE (March 2005)
Chakrabarti, D., Leskovec, J., Faloutsos, C., Madden, S., Guestrin, C., Faloutsos, M.: Information survival threshold in sensor and p2p networks. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 1316–1324. IEEE (May 2007)
Eschelbeck, G.: The laws of vulnerabilities. Technical report, BlackHat Conference, Qualys Inc. (2004)
Newman, M.E.J., Forrest, S., Balthrop, J.: Email networks and the spread of computer viruses. Phys. Rev. E 66, 035101 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wen, S., Xiang, Y., Zhou, W. (2013). Modeling and Analysis for Thwarting Worm Propagation in Email Networks. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_68
Download citation
DOI: https://doi.org/10.1007/978-3-642-38631-2_68
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38630-5
Online ISBN: 978-3-642-38631-2
eBook Packages: Computer ScienceComputer Science (R0)