Defending against Instant Messaging Worms

被引:0
|
作者
Liu, Zhijun [1 ]
Shu, Guoqiang [1 ]
Li, Na [1 ]
Lee, David [1 ]
机构
[1] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43210 USA
关键词
Instant Messaging; AIM; worm;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the real time nature and buddy list presence information of Instant Messaging (IM) systems worms can spread over IM networks rapidly, causing severe damages, however, it is a challenge to detect and control their propagation; it has become an urgent task to develop and deploy efficient procedures to proactively defend against worms before they plague IM networks. Based on modeling and analysis of worm propagation and traffic pattern, we present efficient methods for real time worm detection and control, including content insensitive tracing, signature-based detection, and relay restriction. Experiments on real IM network topologies, such as AIM, have shown promising results of our approaches.
引用
收藏
页数:6
相关论文
共 50 条
  • [11] Instant messaging
    Tessot, Julien
    Alcatel Telecommunications Review, 2003, (03): : 34 - 38
  • [12] Instant messaging
    Resnic, D
    COMPUTER, 2003, 36 (05) : 8 - 8
  • [13] Instant Messaging
    Grewal, Savraj S.
    SCIENTIST, 2013, 27 (03): : 45 - 49
  • [14] Instant messaging
    Bland, C
    IEEE SPECTRUM, 2003, 40 (02) : 14 - 14
  • [15] Instant messaging
    Tessot, J
    ALCATEL TELECOMMUNICATIONS REVIEW, 2003, (4-1): : 34 - 38
  • [16] Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol
    Almari, Raghad
    Almosallam, Abdullah
    Almousa, Saleh
    Alahmadi, Saad
    APPLIED SCIENCES-BASEL, 2024, 14 (14):
  • [17] Defending against Internet worms: A signature-based approach
    Tang, Y
    Chen, SG
    IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 1384 - 1394
  • [18] Characterizing and defending against divide-conquer-scanning worms
    Chen, Chao
    Chen, Zesheng
    Li, Yubin
    COMPUTER NETWORKS, 2010, 54 (18) : 3210 - 3222
  • [19] Secure instant messaging protocol preserving confidentiality against administrator
    Kikuchi, H
    Tada, M
    Nakanishi, S
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 27 - 30
  • [20] Why is instant messaging not instant? Understanding users' negative use behavior of instant messaging software
    Li, Jing
    Zhang, Shiqi
    Ao, Wenting
    COMPUTERS IN HUMAN BEHAVIOR, 2023, 142