DocumentCode :
1902059
Title :
On capturing and containing E-mail worms
Author :
Huang, Chin-Tser ; Johnson, Nathan L. ; Janies, Jeff ; Liu, Alex X.
Author_Institution :
Dept. of Comput. Sci. & Eng., South Carolina Univ., Columbia, SC
fYear :
2006
fDate :
10-12 April 2006
Lastpage :
264
Abstract :
Capturing an E-mail worm and containing its propagation as early as possible is desirable in order to provide better protection for the networks and hosts against severe damage that may be caused by the worm. In this paper, we propose a new approach that makes use of the propagating nature of E-mail worms. This approach inserts into each client´s address book a dummy E-mail address that is not used by any registered user of the local domain, such that we can be confident that any E-mail destined to this dummy E-mail address is generated by an E-mail worm. The captured signatures can then be used to construct a user blacklist and a signature blacklist to contain the propagation of this E-mail worm. We also discuss how E-mail worms can attempt to bypass the dummy E-mail address, and propose countermeasures against these attempts. Our prototype implementation shows that this approach is easily deployable and is effective in containing E-mail worms
Keywords :
digital signatures; electronic mail; invasive software; E-mail worm capturing; client address book; dummy E-mail address; propagation; signature blacklist; user blacklist; Books; Computer networks; Computer science; Computer worms; Electronic mail; IP networks; Intrusion detection; Protection; Prototypes; Software prototyping;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Performance, Computing, and Communications Conference, 2006. IPCCC 2006. 25th IEEE International
Conference_Location :
Phoenix, AZ
Print_ISBN :
1-4244-0198-4
Type :
conf
DOI :
10.1109/.2006.1629415
Filename :
1629415
Link To Document :
بازگشت