The Community for Technology Leaders
Green Image
ISSN: 1545-5971
Sheng Wen , Deakin University, Melbourne
Wei Zhou , Deakin University, Melbourne
Jun Zhang , Deakin University, Melbourne
Yang Xiang , Deakin University, Melbourne
Wanlei Zhou , Deakin University, Melbourne
Weijia Jia , City University of Hong Kong, Hong Kong
Cliff C. Zou , University of Central Florida, Orlando
Due to the critical security threats imposed by email-based malware in recent years, modeling the propagation dynamics of email malware becomes a fundamental technique for predicting its potential damages and developing effective countermeasures. Compared to earlier versions of email malware, modern email malware exhibits two new features, reinfection and self-start. Reinfection refers to the malware behavior that modern email malware sends out malware copies whenever any healthy or infected recipients open the malicious attachment. Self-start refers to the behavior that malware starts to spread whenever compromised computers restart or certain files are visited. In the literature, several models are proposed for email malware propagation, but they did not take into account the above two features and cannot accurately model the propagation dynamics of modern email malware. To address this problem, we derive a novel difference equation based analytical model by introducing a new concept of virtual infected user. The proposed model can precisely present the repetitious spreading process caused by reinfection and self-start and effectively overcome the associated computational challenges. We perform comprehensive empirical and theoretical study to validate the proposed analytical model. The results show our model outperforms previous models in terms of both estimation accuracy and computation cost.
Network management, Network-level security and protection
Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia, Cliff C. Zou, "Modeling and Analysis on the Propagation Dynamics of Modern Email Malware", IEEE Transactions on Dependable and Secure Computing, vol. , no. , pp. 0, 5555, doi:10.1109/TDSC.2013.49
172 ms
(Ver 3.3 (11022016))