Abstract:
In recent years, cross-site scripting attacking usually occurred on the social networks. The attackers hide the malicious script codes in web links, and easily get person...Show MoreMetadata
Abstract:
In recent years, cross-site scripting attacking usually occurred on the social networks. The attackers hide the malicious script codes in web links, and easily get personal sensitive information if someone clicks these links. This article firstly analyzes the characteristics of the social network topology and the relationships of network users, and then establishes the worm propagation model in order to draw out worm propagation procedures among network nodes. Finally some impacts, which consist of the number of online users, the probability of users click worm links, the release time of immune patches and the quantity of users installed patches on the worm propagation, are discussed.
Published in: 2013 IEEE Globecom Workshops (GC Wkshps)
Date of Conference: 09-13 December 2013
Date Added to IEEE Xplore: 05 June 2014
Electronic ISBN:978-1-4799-2851-4
Print ISSN: 2166-0077