Sciweavers

IPCCC
2006
IEEE

On capturing and containing E-mail worms

14 years 6 months ago
On capturing and containing E-mail worms
Capturing an e-mail worm and containing its propagation as early as possible is desirable in order to provide better protection for the networks and hosts against severe damage that may be caused by the worm. In this paper, we propose a new approach that makes use of the propagating nature of e-mail worms. This approach inserts into each client’s address book a dummy e-mail address that is not used by any registered user of the local domain, such that we can be confident that any e-mail destined to this dummy e-mail address is generated by an e-mail worm. The captured signatures can then be used to construct a user blacklist and a signature blacklist to contain the propagation of this e-mail worm. We also discuss how e-mail worms can attempt to bypass the dummy e-mail address, and propose countermeasures against these attempts. Our prototype implementation shows that this approach is easily deployable and is effective in containing e-mail worms.
Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, A
Added 11 Jun 2010
Updated 11 Jun 2010
Type Conference
Year 2006
Where IPCCC
Authors Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, Alex X. Liu
Comments (0)