DocumentCode
2329720
Title
NIS08-6: Defending against Instant Messaging Worms
Author
Liu, Zhijun ; Shu, Guoqiang ; Li, Na ; Lee, David
Author_Institution
Dept. of Comput. Sci. & Eng., Ohio State Univ., Columbus, OH
fYear
2006
fDate
Nov. 27 2006-Dec. 1 2006
Firstpage
1
Lastpage
6
Abstract
Due to the real time nature and buddy list presence information of instant messaging (IM) systems worms can spread over IM networks rapidly, causing severe damages, however, it is a challenge to detect and control their propagation; it has become an urgent task to develop and deploy efficient procedures to proactively defend against worms before they plague IM networks. Based on modeling and analysis of worm propagation and traffic pattern, we present efficient methods for real time worm detection and control, including content insensitive tracing, signature-based detection, and relay restriction. Experiments on real IM network topologies, such as AIM, have shown promising results of our approaches.
Keywords
electronic messaging; invasive software; telecommunication security; telecommunication traffic; IM network topologies; content-insensitive tracing; instant messaging worms; real-time worm control; real-time worm detection; relay restriction; signature-based detection; traffic pattern; worm propagation; Computer science; Computer worms; Electronic mail; Internet; Network servers; Real time systems; Relays; Traffic control; Uniform resource locators; Web server;
fLanguage
English
Publisher
ieee
Conference_Titel
Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE
Conference_Location
San Francisco, CA
ISSN
1930-529X
Print_ISBN
1-4244-0356-1
Electronic_ISBN
1930-529X
Type
conf
DOI
10.1109/GLOCOM.2006.307
Filename
4150937
Link To Document