An Effective Scheme for Email Virus Detection and Containment

نویسنده

  • Jintao Xiong
چکیده

Email has evolved to be a convenient and important communication media. It greatly facilitates the communication among people from all over the world. The existence of all kinds of free email services makes email communication even more attractive. The convenience and popularity of emails has also made them ideal vehicles to spread computer worms and viruses. Email viruses and worms have appeared more frequently in recent months. How to detect and contain the spread of email viruses and worms while minimizing the side effects on normal email communications is a very important topic. This paper proposes an email virus detection and containment scheme to address this issue. Our scheme is inspired by the infectious disease control schemes used in real world. An infected computer is identified if it meets two conditions. Firstly, the computer has to demonstrate abnormal behavior by sending out large number of emails with attachments. Secondly, some of the computers which receive these emails have to demonstrate similar abnormal behavior. We propose to apply the "stone-in-the-pond" principle to reduce the overhead of the email virus detection system. The identified infected computers can then be isolated. Simulation experiments demonstrate that our proposed scheme is effective in controlling the spread of email viruses.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET’2004)

Email has evolved to be a convenient and important communication media. It greatly facilitates the communication among people from all over the world. The existence of all kinds of free email services makes email communication even more attractive. The convenience and popularity of emails has also made them ideal vehicles to spread computer worms and viruses. Email viruses and worms have appear...

متن کامل

A High Capacity Email Steganography Scheme using Dictionary

The main objective of steganography is to conceal a secret message within a cover-media in such a way that only the original receiver can discern the presence of the hidden message. The cover-media can be a text, email, audio, image, and video, which can be transmitted through a public channel, such as the Internet. By extending the use of email among Internet users, the provision of email steg...

متن کامل

An approach to containing computer viruses

This paper presents a mechanism for containing the spread of computer viruses by detecting at run-time whether or not an executable has been modified since its installation. The detection strategy uses encryption and is held to be better for virus containment than conventional computer security mechanisms which are based on the incorrect assumption that preventing modification of executables by...

متن کامل

Investigating Effective Parameters in Tactile Determination of Artery included in Soft Tissue by FEM

One of the newest ways of surgery is known as Minimally Invasive Surgery (MIS), which in spite of its benefits, because of surgeon's tactile sensing omission, causes some problems with detection of arteries and their exact positions in tissue during a surgery. In this study, tactile detection of an artery in tissue has been modeled by finite element method. In this modeling, three 2D models of ...

متن کامل

Loop-Mediated Isothermal Amplification (LAMP) for the Rapid Diagnosis of Herpes Simplex Virus Type 1 (HSV-1)

Background and Aims: considering difficulties in usual laboratory methods in detection of viral infections, improved DNA-based diagnostic techniques are more reliable. Loop mediated isothermal amplification method (LAMP) is a nucleic acid amplification method that amplifies DNA using six primers which has been developed to diagnose viruses as a rapid and high efficiency test. In this study, the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004