Supercharge Your Innovation With Domain-Expert AI Agents!

Method for detecting Email worm

A detection method and technology for worms, which are applied in the fields of instruments, computing, and electrical and digital data processing, can solve problems such as difficulty in finding, and the effect is not obvious, and achieve the effects of improving efficiency, reducing load, and improving compatibility.

Inactive Publication Date: 2012-08-22
CHONGQING FENGMEI INFORMATION TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

ZOUC, Gong W, TOWSLEY D. Feedback email worm defense system for enterprise networks[C] / / Umass ECE Technical Report TR-04-CSE-05: Umass, 2004. Introduced a detection method called "Feedback Defense System" ( Feedback Defense System), which utilizes existing intrusion detection software to intercept suspicious emails, and then uses a virtual honeypot system for analysis and detection. This method has a good protective effect on Email users, but for Email worms in the network Active control of broadcasting, the effect is not very obvious
GUPTA A, SEKAR R. An approach for detecting self-propagating Email using anomaly detection[C] / / Proceedings of Recent Advances in Intrusion Detection (RAID). Pittsburgh PA: Springer, 2003: 55-72. Introduced a method using machine learning The method of monitoring abnormal network traffic can effectively reduce the detection false positive rate, but this method needs to collect statistics on network traffic, and there is a certain detection delay
HUSNA H, PHITHAKKITNUKOONS, DANTU R.Traffic shaping of spam botnets[C] / / Proceedings of CCNC 2008, 5thIEEE.Las Vegas, NV: IEEE, 2008: 786-787. Proposed a method of using entropy to classify spam , this method analyzes the behavioral characteristics of spam (such as the number of consecutive emails sent in a unit time period), and uses the size of the entropy value to quickly distinguish spam from normal emails. The accuracy of this classification method depends on The size of the threshold, for the defender, it is difficult to find a suitable threshold to make the detection result achieve the minimum false positive (normal nodes are wrongly classified as infected nodes by the detection mechanism) and the minimum false negative (infected nodes are detected mechanism incorrectly classified as a normal node)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting Email worm
  • Method for detecting Email worm
  • Method for detecting Email worm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0097] 1. Single point detection:

[0098] Using single-point detection method to detect the infection characteristics of a network node. In this embodiment, the entire detection cycle is divided into four time periods: T1, T2, T3, and T4. The duration of each time period is set to 160 seconds. For the infection characteristic curves of the detected nodes in each time period, see image 3 ;Take the thresholds M=100, 200 and 300 respectively, and use the differential entropy to calculate the data of the 4 time periods. For the calculation results, see Figure 4 .

[0099] 2. Multi-point tracking detection:

[0100] For the tracking chain establishment process, see Figure 5 : Set M=2, t1i represents the level of node i. There are two tracking chains in the graph, nodes 1, 2, and 3 form chain 1, and nodes 5 and 4 form chain 2. At time t1, node 1 and node 5 have infection characteristics, and are connected to node 2 and node 4 respectively, and node 1 and node 5 are respecti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method CTCBF (Contact-Tracing Chain Based Framework) for detecting Email worms. The method is characterized in that differential entropy is utilized to detect abnormal sending of Emails at a network node; a tracing chain is established according to the connection relation between abnormal network nodes by means of a tracking algorithm; and when the length of the tracking chain is up to a certain threshold value, suspicious nodes on the chain are confirmed as infected nodes. Aiming at the nondeterminacy of the threshold value, the present invention provides a method of dynamic threshold value in which a threshold value is dynamically varied according to different network infection levels. The method can rapidly and accurately detect the dissemination of worms, and provide a now mode for detecting unknown Email worms.

Description

technical field [0001] The invention relates to the technical field of computer network virus detection, in particular to an Email worm detection method. Background technique [0002] Email worms are a common computer virus. It uses the network for replication and dissemination, and the way of infection is through the network and e-mail. A worm is a self-contained program that copies itself or parts of itself and spreads across a network to other computer systems. [0003] The biggest feature of the Email worm is that it can use Email to actively self-propagate, which is mainly reflected in two behavioral characteristics: infection characteristics and connection characteristics. Infection feature means that the monitored node has an abnormal active connection to other network nodes (such as the number of emails sent in a unit time period exceeds the preset threshold); connection feature means that the monitored node has an infected node or Behavior of suspicious node conn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08G06F21/00G06F21/56
Inventor 黄智勇曾孝平周建林仲元红熊东
Owner CHONGQING FENGMEI INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More