SlideShare a Scribd company logo
1 of 5
Download to read offline
M.Vijayapriya et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.192-196
www.ijera.com 192|P a g e
Secure and Reliable Data Transmission in Generalized E-Mail
1#
M.Vijayapriya,PG Scholar,2#
N.Anandh,Assistant Professor
3#
B.Gohila vani,PG Scholar,4#
A.Selvaraj,Assistant Professor
Department of CSE,Anna University
Muthayammal Engineering College,Namakkal-637 408
Abstract
Email is a basic service for computer users, while email malware poses critical security threats. The technique of
email-borne malware will be highly effective. Email malware focuses on modeling the propagation dynamics
which is a fundamental technique for developing countermeasures to reduce email malware’s spreading speed
and prevalence. Modern email malware exhibits two new features, reinjection and self-start. Reinjection is an
infected user sends out malware copies whenever this user visits the malicious hyperlinks or attachments. Self-
start refers to the behavior that malware starts to spread whenever compromised computers restart or certain
files are visited. For address this problem, to derive a novel difference equation based analytical model by
introducing a new concept of virtual dirty user. Propose a new analytical model to enhanced OLSR protocol
which is a trust based technique to secure the OLSR nodes against the attack. The proposed solution called
EOLSR is an enhancement of the basic OLSR routing protocol, which will be able to detect the presence of
malicious nodes in the network.
Keywords: Network security, email malware, propagation modeling
I. INTRODUCTION
Malware short for malicious software, is any
software used to disrupt computer operation, gather
sensitive information, or gain access to private
computer systems. It can appear in the form of
executable code, scripts, active content, and other
software. With the escalating growth of
communication and information systems, a new term
and acronym invaded the digital world called as
malware. It is a general term, which stands for
malicious software and has many shapes (codes,
scripts, active content and others). It has been
designed to achieve some targets such as, collecting
sensitive data, accessing private computer systems,
even sometimes harming the systems. The malware
can reach the systems in different ways and through
multiple media; the most common way is the
downloading process from the internet, once the
malware finds its way to the systems, based on the
functions of the malware the drama will begin.
II. RELATED WORK
In [1] C.C. Zou, D. Towsley, and W. Gong et al
presents for there an electronic mail worm imitation
replica that the books for the behaviors of
correspondence users, counting email examination
time and the likelihood of aperture and
communication superfluous. Our annotations of
news item lists recommend that an Internet send
arrangement follows a heavy-tailed allocation in
stipulations of swelling degrees, and facsimile it as
an influence law friendship. To modify the
topological collision, we evaluate message larva
broadcast on power law topology with maggot
dissemination on two other topologies: small planet
topology and accidental grid topology.
In [2] S. Wen, W. Zhou, Y. Wang, W. Zhou et al
presents A familiar examination for the preferable
positions o awkward worm dissemination is at the
greatly coupled nodes. To appraise the cause on
uncomfortable maggot broadcasting by quarantining
firm nodes, we recommend an illustration to
symbolize the scattering practice of topological
worms. Firstly, a communicable swelling can
proliferate worms, and a susceptible user can be
contaminated and turn into a novel communicable
bump.
In [3] Y. Wang, S. Wen, S. Cesare et al presents
Research on larva broadcast has been conducted for
more than a decade. However, customary models
misjudge the scale of the tainted net that leads to
proliferation errors because of partial and mistaken
psychotherapy of the circulation course of action
between each pair of nodes in the complex. For
focus on analyzing the shape of broadcast errors and
examined the collision of eliminating errors on the
proliferation practice on two unusual types of
worms. We encompass revealed by simulations that
errors augment as added dissemination cycles are
bent and quantified the errors under special
transmission scenarios
RESEARCH ARTICLE OPEN ACCESS
M.Vijayapriya et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.192-196
www.ijera.com 193|P a g e
In [4] S.M. Cheng, W.C. Ao, P.Y. Chen et al
presents A amalgam malware on elegant phones can
be propagated by both end-to-end messaging
military via delicate social transportation and short-
range wireless communiqué navy via spatial social
interactions. stimulated from epidemiology, propose
a novel differential equation-based model to analyze
the mixed behaviors of delocalized infection and
ripple based propagation for the hybrid malware in
generalized social networks consisting of personal
and spatial social relations.
In [5] R. Thommes and M. Coates et al presents the
fame of peer-to-peer (P2P) networks makes them an
gorgeous objective to the creators of viruses and
extra malevolent regulations. Freshly a amount of
viruses premeditated explicitly to widen via P2P
networks boast emerged. Toxic waste has also
turned into ever more widespread as patent holders
inject multiple decoy versions in order to hinder
entry allotment. In this manuscript gain deterministic
epidemiological models for the transmission of a
P2P germ during a P2P network and the spreading of
effluence.
III. P2P MODEL NETWORK
The recommend geometric models, which have
capture the truthful topological in sequence. The
sequential dynamics and the spatial dependence
dilemma in the propagation modeling. nevertheless,
all these model cannot present the reinfection and
self-start process of up to date email malware. Their
moving parts study the final stable state of epidemic
spread based on SIS models, whereas we study the
transient propagation dynamics of modern email
malware. Second, there are some works which
characterize the propagation dynamics of isomorphic
malware, such as P2P malware, mobile malware and
malware on online social networks. The differential
equations to present the propagation of P2P malware
through a P2P network. The models are proposed for
the mobile environment by presuming nodes meet
each other with a probability. These works assume
all individual devices are homogeneously mixed,
and thus, they are unlikely to work in the real mobile
environment. The models present the propagation of
online social malware by simulations. Since these
models are based on non reinfection, they cannot be
adopted to present the propagation of modern email
malware.
IV. EXISTING SYSTEM
These observations become the motivation of
work to develop a new analytical model that can
precisely present the propagation dynamics of the
modern email malware. The spreading procedure
can be characterized by a Susceptible-Infected-
Immunized (SII) process.
The major contributions of this paper are listed
below:
To introduce a new concept of virtual nodes to
address the underestimation in previous work, which
can represent the situation of a user sending out one
more round of malware copies each time this user
gets infected.Perform empirical and theoretical study
to investigate why and how the proposed SII model
is superior to existing models. Modern email
malware exhibits two new features, reinfection and
self-start. For address this problem, to derive a novel
difference equation based analytical model by
introducing a new concept of virtual infected user.
A new analytical model to capture the
interactions among the infected email users by a set
of difference equations, which is together describe
the overall propagation of the modern email
malware. The proposed a novel SII model for the
propagation of modern email malware.
This model is able to address two critical
processes unsolved in previous models: the
reinfection and the self-start. By introducing a
group of difference equations and virtual nodes, it
presented the repetitious spreading processes caused
by the reinfection and the self-start.
4.1 LIMITATIONS
 It is malicious software
 Does not achieve greater accuracy
 Malware called topological scanning
malware that spread based on topology
information
V. PROPOSED SYSTEM
Analyzing the attack, propose a mechanism
called enhanced OLSR (EOLSR) protocol which is a
trust based technique to secure the OLSR nodes
against the attack. The proposed solution called
EOLSR is an enhancement of the basic OLSR
routing protocol, which will be able to detect the
presence of malicious nodes in the network. In
proposed system assumes that all the nodes are
authenticated and can participate in communication
i.e., all nodes are authorized nodes. In our protocol is
able to achieve routing security with increase in
packet delivery ratio and reduction in packet loss
rate.
The Optimized Link State Routing Protocol
(OLSR) is an IP routing protocol optimized for
mobile ad hoc networks, which can also be used on
other wireless ad hoc networks. OLSR is a proactive
link-state routing protocol, which uses hello and
Topology Control (TC) messages to discover and
then disseminate link state information throughout
the mobile ad hoc network.
Individual nodes use this topology information
to compute next hop destinations for all nodes in the
M.Vijayapriya et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.192-196
www.ijera.com 194|P a g e
network using shortest hop forwarding paths.Link-
state routing protocols such as Open Shortest Path
First (OSPF) and IS-IS select a designated router on
every link to perform flooding of topology
information. In wireless ad hoc networks, there is
different notion of a link, packets can and do go out
the same interface; hence, a different approach is
needed in order to optimize the flooding process.
Using Hello messages the OLSR protocol at each
node discovers 2-hop neighbor information and
performs a distributed election of a set of multipoint
relays (MPRs). Nodes select MPRs such that there
exist a path to each of its 2-hop neighbors via a node
selected as an MPR. These MPR nodes then source
and forward TC messages that contain the MPR
selectors.
This functioning of MPRs makes OLSR unique
from other link state routing protocols in a few
different ways: The forwarding path for TC
messages is not shared among all nodes but varies
depending on the source, only a subset of nodes
source link state information, not all links of a node
are advertised but only those that represent MPR
selections.Since link-state routing requires the
topology database to be synchronized across the
network, OSPF and IS-IS perform topology flooding
using a reliable algorithm. Such an algorithm is very
difficult to design for ad hoc wireless networks, so
OLSR doesn't bother with reliability; it simply
floods topology data often enough to make sure that
the database does not remain unsynchronized for
extended periods of time.
5.1 Network Formation
It consist of a set of nodes .Each and every
node should have some kinds of ID, which is like
N1, N2,…and Nn. Each node communicate with
another rnode.all the nodes are authenticated
5.2 Attacker Performance
Malware to disrupt computer operation, gather
sensitive information, or gain access to private
computer systems. For modern email malware, recall
that a compromised user may send out malware
email copies to neighbors every time the user visits
those malware hyperlinks or attachments.
SYSTEM ARCHITECTURE:
Fig 5:system architecture
5.3 Data Transfer Through the Virtual Node
Virtual node can represent the situation of a user
sending out one more round of malware copies each
time this user gets infected. In order to represent the
repetitious spreading process of the reinfection and
the self-start, introduce virtual nodes to present the
infection caused by infected users opening the
malware email copy.
5.4 Detection of Attackers
To analyze the vulnerabilities of a pro-active
routing protocol called optimized link state routing
(OLSR) against a specific type of denial-of-service
(DOS) attack called node isolation attack. Analyzing
the attack, propose a mechanism called enhanced
OLSR (EOLSR) protocol which is a trust based
technique to secure the OLSR nodes against the
attack. The technique is capable of finding whether a
Social
networks
Email
Malware
Reinfection Self-start
Malware behavior Malware starts to
spread malware copies
Disturb the
computer
operation
Email malware exhibits
two new features
Susceptible infected
immunized (SII) process
Capture the
Interactions among the
infected email users
Estimation accuracy
To introduce OLSR
protocol for secure the
node against the attack
M.Vijayapriya et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.192-196
www.ijera.com 195|P a g e
node is advertising correct topology information or
not by verifying its Hello packets, thus detecting
node isolation attacks.
PERFORMANCE EVALUATION
VI. CONCLUSION
Susceptible-Infected-Susceptible (SII) model for
the propagation of modern email malware and is
used to address two critical processes unsolved in
previous models: the reinfection and the self-start.
The experiments showed that the result of Optimal
Link State Routing Protocol (OLSR) model is close
to the simulations. Propose a new analytical model
to enhanced OLSR protocol which is a trust based
technique to secure the OLSR nodes against the
attack. The proposed solution called EOLSR is an
enhancement of the basic OLSR routing protocol,
which will be able to detect the presence of
malicious nodes in the network.
REFERENCES
[1] C.C. Zou, D. Towsley, and W. Gong,
“Modeling and Simulation Study of the
Propagation and Defense of Internet E-Mail
Worms,” IEEE Trans. Dependable and
Secure Computing, vol. 4, no. 2, pp. 105-
118, Apr.-June 2007.
[2] S. Wen, W. Zhou, Y. Wang, W. Zhou, and
Y. Xiang, “Locating Defense Positions for
Thwarting the Propagation of Topological
Worms,” IEEE Comm. Letters, vol. 16, no.
4, pp. 560-563, Apr. 2012.
[3] Y. Wang, S. Wen, S. Cesare, W. Zhou, and
Y. Xiang, “Eliminating Errors in Worm
Propagation Models,” IEEE Comm. Letters,
vol. 15, no. 9, pp. 1022-1024, Sept. 2011.
[4] S.M. Cheng, W.C. Ao, P.Y. Chen, and K.C.
Chen, “On Modeling Malware Propagation
in Generalized Social Networks,” IEEE
Comm. Letters, vol. 15, no. 1, pp. 25-27,
Jan. 2011.
[5] R. Thommes and M.
Coates,“Epidemiological Modelling of
PeertoPeer Viruses and Pollution,” Proc.
IEEE INFOCOM ’06, pp. 1-12, 2006.
[6] M. Fossi and J. Blackbird, “Symantec
Internet Security Threat Report 2010,”
technical report Symantec Corporation, Mar.
2011.
[7] P. Wood and G. Egan, “Symantec Internet
Security Threat Report 2011,” technical
report, Symantec Corporation, Apr. 2012.
[8] Z. Chen and C. Ji, “Spatial-Temporal
Modeling of Malware Propagation in
Networks,” IEEE Trans. Neural Networks,
vol. 16, no. 5, pp. 1291-1303, Sept. 2005.
[9] C. Gao, J. Liu, and N. Zhong, “Network
Immunization and Virus Propagation in
Email Networks: Experimental Evaluation
and Analysis,” Knowledge and Information
Systems, vol. 27, pp. 253-279, 2011.
[10] J. Xiong, “Act: Attachment Chain Tracing
Scheme for Email Virus Detection and
Control,” Proc. ACM Workshop Rapid
Malcode (WORM ’04), pp. 11-22, 2004.
[11] S. Wen, W. Zhou, J. Zhang, Y. Xiang, W.
Zhou, and W. Jia, “Modeling Propagation
Dynamics of Social Network Worms,” IEEE
Trans. Parallel and Distributed Systems, vol.
24, no. 8, pp. 1633- 1643, Aug. 2013.
[12] (1999) Cert, advisory ca-1999-04, Melissa
Macro Virus, http://
www.cert.org/advisories/CA-1999-04.html,
2009.
[13] Cert, Advisory ca-2000-04, Love Letter
Worm, http://www.cert. org/advisories/CA-
2000-04.html, 2000.
[14] M. Calzarossa and E. Gelenbe, Performance
Tools and Applications to Networked
Systems: Revised Tutorial Lectures.
Springer-Verlag, 2004.
[15] G. Serazzi and S. Zanero, “Computer Virus
Propagation Models,” Proc. 11th IEEE/ACM
Int’l Conf. Modeling, Analysis and
Simulations of Computer and Telecomm.
Systems (MASCOTS ’03), pp. 1-10, Oct.
2003.
[16] B. Rozenberg, E. Gudes, and Y. Elovici,
“SISR: A New Model for Epidemic
Spreading of Electronic Threats,” Proc. 12th
Int’l Conf. Information Security, pp. 242-
249, 2009.
[17] C. Wong, S. Bielski, J.M. McCune, and C.
Wang,“A Study of Mass-Mailing Worms,”
Proc. ACM Workshop Rapid Malcode
(WORM ’04), pp. 1-10, 2004.
[18] D. Moore and C. Shannon, “The Nyxem
Email Virus: Analysis and Inferences,”
technical report, CAIDA, Feb. 2006.
[19] Symantec, A-Z Listing of Threats and Risks,
http://www. symantec.com/security
Response, 2012.
M.Vijayapriya et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.192-196
www.ijera.com 196|P a g e
[20] C. Zou, Internet Email Worm Propagation
Simulator, http://
www.cs.ucf.edu/czou/research/emailWormS
imulationhtml , 2005.
[21] M. Boguna, R. Pastor-Satorras, and A.
Vespignani, “Epidemic Spreading in
Complex Networks with Degree
Correlations,” Lecture Notes in Physics, vol.
625, pp. 1-23, 2003.
[22] Y. Wang, D. Chakrabarti, C. Wang, and C.
Faloutsos, “Epidemic Spreading in Real
Networks: An Eigenvalue Viewpoint,” Proc.
22nd Int’l Symp. Reliable Distributed
Systems (SRDS), pp. 25-34, 2003.
[23] A.J. Ganesh, L. Massouli, and D.F.
Towsley,“The Effect of Network Topology
on the Spread of Epidemics,” Proc. IEEE
INFOCOM ’05, pp. 1455-1466, 2005.
[24] D. Chakrabarti, J. Leskovec, C. Faloutsos, S.
Madden, C. Guestrin, and M. Faloutsos,
“Information Survival Threshold in Sensor
and p2p Networks,” Proc. IEEE INFOCOM
’07, pp.

More Related Content

What's hot

Disease spreading & control in temporal networks
Disease spreading & control in temporal networksDisease spreading & control in temporal networks
Disease spreading & control in temporal networksPetter Holme
 
Spreading processes on temporal networks
Spreading processes on temporal networksSpreading processes on temporal networks
Spreading processes on temporal networksPetter Holme
 
Copyright Protection in Peer To Peer Network
Copyright Protection in Peer To Peer NetworkCopyright Protection in Peer To Peer Network
Copyright Protection in Peer To Peer NetworkIJERA Editor
 
Detecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSDetecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSIRJET Journal
 
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...IJNSA Journal
 
Analysis and detection of computer viruses and worms
Analysis and detection of computer viruses and wormsAnalysis and detection of computer viruses and worms
Analysis and detection of computer viruses and wormsUltraUploader
 
A computational model of computer virus propagation
A computational model of computer virus propagationA computational model of computer virus propagation
A computational model of computer virus propagationUltraUploader
 
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATIONCONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATIONIJNSA Journal
 
Malwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant ExtractionMalwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant ExtractionIOSR Journals
 
IRJET- The Hidden Virus Propagation Search Engine Attack
IRJET- The  Hidden Virus  Propagation Search Engine AttackIRJET- The  Hidden Virus  Propagation Search Engine Attack
IRJET- The Hidden Virus Propagation Search Engine AttackIRJET Journal
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...IEEEGLOBALSOFTTECHNOLOGIES
 
Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...eSAT Publishing House
 
Temporal Networks of Human Interaction
Temporal Networks of Human InteractionTemporal Networks of Human Interaction
Temporal Networks of Human InteractionPetter Holme
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...IEEEGLOBALSOFTTECHNOLOGIES
 
Intruder adaptability
Intruder adaptabilityIntruder adaptability
Intruder adaptabilityugilad
 

What's hot (18)

G0434045
G0434045G0434045
G0434045
 
Disease spreading & control in temporal networks
Disease spreading & control in temporal networksDisease spreading & control in temporal networks
Disease spreading & control in temporal networks
 
Spreading processes on temporal networks
Spreading processes on temporal networksSpreading processes on temporal networks
Spreading processes on temporal networks
 
Copyright Protection in Peer To Peer Network
Copyright Protection in Peer To Peer NetworkCopyright Protection in Peer To Peer Network
Copyright Protection in Peer To Peer Network
 
Detecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSDetecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSS
 
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
 
Analysis and detection of computer viruses and worms
Analysis and detection of computer viruses and wormsAnalysis and detection of computer viruses and worms
Analysis and detection of computer viruses and worms
 
A computational model of computer virus propagation
A computational model of computer virus propagationA computational model of computer virus propagation
A computational model of computer virus propagation
 
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATIONCONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
 
Malwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant ExtractionMalwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant Extraction
 
IRJET- The Hidden Virus Propagation Search Engine Attack
IRJET- The  Hidden Virus  Propagation Search Engine AttackIRJET- The  Hidden Virus  Propagation Search Engine Attack
IRJET- The Hidden Virus Propagation Search Engine Attack
 
B0940509
B0940509B0940509
B0940509
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
 
Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...
 
Hg3312711275
Hg3312711275Hg3312711275
Hg3312711275
 
Temporal Networks of Human Interaction
Temporal Networks of Human InteractionTemporal Networks of Human Interaction
Temporal Networks of Human Interaction
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
Intruder adaptability
Intruder adaptabilityIntruder adaptability
Intruder adaptability
 

Viewers also liked

Radar target detection simulation
Radar target detection simulationRadar target detection simulation
Radar target detection simulationIJERA Editor
 
Kansrekening les2 gvan alst
Kansrekening les2 gvan alstKansrekening les2 gvan alst
Kansrekening les2 gvan alstGerard van Alst
 
ידיעון כרמיה 1-2015
ידיעון כרמיה 1-2015ידיעון כרמיה 1-2015
ידיעון כרמיה 1-2015perachadi
 
Применение здоровьесберегающих технологий науроках физики
Применение здоровьесберегающих технологий науроках физикиПрименение здоровьесберегающих технологий науроках физики
Применение здоровьесберегающих технологий науроках физикиnaitli
 
Tilitoimiston asiakaskeskeisyyden strategia
Tilitoimiston asiakaskeskeisyyden strategiaTilitoimiston asiakaskeskeisyyden strategia
Tilitoimiston asiakaskeskeisyyden strategiaLeijonaksi
 
ηθη και εθιμα χριστουγεννων
ηθη και εθιμα χριστουγεννωνηθη και εθιμα χριστουγεννων
ηθη και εθιμα χριστουγεννωνTsormpatzoglou Nestor
 
Grasp and Manipulation of Five Fingered Hand Robot in Unstructured Environments
Grasp and Manipulation of Five Fingered Hand Robot in Unstructured EnvironmentsGrasp and Manipulation of Five Fingered Hand Robot in Unstructured Environments
Grasp and Manipulation of Five Fingered Hand Robot in Unstructured EnvironmentsIJERA Editor
 
Дорожная азбука
Дорожная азбукаДорожная азбука
Дорожная азбукаco1858
 
Intrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A SurveyIntrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A SurveyIJERA Editor
 
M U S I C A N D S U P E R H E A L T H D R
M U S I C  A N D  S U P E R H E A L T H  D RM U S I C  A N D  S U P E R H E A L T H  D R
M U S I C A N D S U P E R H E A L T H D Rdrsolapurkar
 
μυστράς (2)
μυστράς (2)μυστράς (2)
μυστράς (2)Theod13
 
A review paper on Optimization of process parameter of EDM for air hardening ...
A review paper on Optimization of process parameter of EDM for air hardening ...A review paper on Optimization of process parameter of EDM for air hardening ...
A review paper on Optimization of process parameter of EDM for air hardening ...IJERA Editor
 
Подарки к 23 февраля
Подарки к 23 февраляПодарки к 23 февраля
Подарки к 23 февраляGiftsPro.Ru
 
FJ Trial Marketwired Case Study
FJ Trial Marketwired Case StudyFJ Trial Marketwired Case Study
FJ Trial Marketwired Case StudyMelissa Hulbert
 

Viewers also liked (20)

Radar target detection simulation
Radar target detection simulationRadar target detection simulation
Radar target detection simulation
 
Còmic Paula
Còmic PaulaCòmic Paula
Còmic Paula
 
Kansrekening les2 gvan alst
Kansrekening les2 gvan alstKansrekening les2 gvan alst
Kansrekening les2 gvan alst
 
ידיעון כרמיה 1-2015
ידיעון כרמיה 1-2015ידיעון כרמיה 1-2015
ידיעון כרמיה 1-2015
 
Применение здоровьесберегающих технологий науроках физики
Применение здоровьесберегающих технологий науроках физикиПрименение здоровьесберегающих технологий науроках физики
Применение здоровьесберегающих технологий науроках физики
 
Tilitoimiston asiakaskeskeisyyden strategia
Tilitoimiston asiakaskeskeisyyden strategiaTilitoimiston asiakaskeskeisyyden strategia
Tilitoimiston asiakaskeskeisyyden strategia
 
Appendix 10
Appendix 10Appendix 10
Appendix 10
 
Gap1 by mk
Gap1 by mkGap1 by mk
Gap1 by mk
 
ηθη και εθιμα χριστουγεννων
ηθη και εθιμα χριστουγεννωνηθη και εθιμα χριστουγεννων
ηθη και εθιμα χριστουγεννων
 
Usługi sieci internet cz iiii 2012
Usługi sieci internet cz iiii   2012Usługi sieci internet cz iiii   2012
Usługi sieci internet cz iiii 2012
 
agusto riandi
agusto riandiagusto riandi
agusto riandi
 
Grasp and Manipulation of Five Fingered Hand Robot in Unstructured Environments
Grasp and Manipulation of Five Fingered Hand Robot in Unstructured EnvironmentsGrasp and Manipulation of Five Fingered Hand Robot in Unstructured Environments
Grasp and Manipulation of Five Fingered Hand Robot in Unstructured Environments
 
Дорожная азбука
Дорожная азбукаДорожная азбука
Дорожная азбука
 
The Virtual Museum Report for 2014
The Virtual Museum Report for 2014The Virtual Museum Report for 2014
The Virtual Museum Report for 2014
 
Intrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A SurveyIntrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A Survey
 
M U S I C A N D S U P E R H E A L T H D R
M U S I C  A N D  S U P E R H E A L T H  D RM U S I C  A N D  S U P E R H E A L T H  D R
M U S I C A N D S U P E R H E A L T H D R
 
μυστράς (2)
μυστράς (2)μυστράς (2)
μυστράς (2)
 
A review paper on Optimization of process parameter of EDM for air hardening ...
A review paper on Optimization of process parameter of EDM for air hardening ...A review paper on Optimization of process parameter of EDM for air hardening ...
A review paper on Optimization of process parameter of EDM for air hardening ...
 
Подарки к 23 февраля
Подарки к 23 февраляПодарки к 23 февраля
Подарки к 23 февраля
 
FJ Trial Marketwired Case Study
FJ Trial Marketwired Case StudyFJ Trial Marketwired Case Study
FJ Trial Marketwired Case Study
 

Similar to Secure and Reliable Data Transmission in Generalized E-Mail

Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networksPvrtechnologies Nellore
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceIJECEIAES
 
A cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetA cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetUltraUploader
 
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...IOSR Journals
 
A mixed abstraction level simulation model of large scale internet worm infes...
A mixed abstraction level simulation model of large scale internet worm infes...A mixed abstraction level simulation model of large scale internet worm infes...
A mixed abstraction level simulation model of large scale internet worm infes...UltraUploader
 
@@@Rf8 polymorphic worm detection using structural infor (control flow gra...
@@@Rf8 polymorphic worm detection using structural infor    (control flow gra...@@@Rf8 polymorphic worm detection using structural infor    (control flow gra...
@@@Rf8 polymorphic worm detection using structural infor (control flow gra...zeinabmovasaghinia
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging wormdeepikareddy123
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging wormdeepikareddy123
 
Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
Modeling and Threshold Sensitivity Analysis of Computer Virus EpidemicModeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
Modeling and Threshold Sensitivity Analysis of Computer Virus EpidemicIOSR Journals
 
Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Mumbai Academisc
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networksShakas Technologies
 
IRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source IdentificationIRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source IdentificationIRJET Journal
 
An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...UltraUploader
 
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIdentifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIRJET Journal
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networksShakas Technologies
 
An epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanupAn epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanupUltraUploader
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensicsIJNSA Journal
 

Similar to Secure and Reliable Data Transmission in Generalized E-Mail (20)

Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networks
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
A cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetA cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internet
 
H0434651
H0434651H0434651
H0434651
 
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
 
A mixed abstraction level simulation model of large scale internet worm infes...
A mixed abstraction level simulation model of large scale internet worm infes...A mixed abstraction level simulation model of large scale internet worm infes...
A mixed abstraction level simulation model of large scale internet worm infes...
 
@@@Rf8 polymorphic worm detection using structural infor (control flow gra...
@@@Rf8 polymorphic worm detection using structural infor    (control flow gra...@@@Rf8 polymorphic worm detection using structural infor    (control flow gra...
@@@Rf8 polymorphic worm detection using structural infor (control flow gra...
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging worm
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging worm
 
I017134347
I017134347I017134347
I017134347
 
Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
Modeling and Threshold Sensitivity Analysis of Computer Virus EpidemicModeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
 
Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networks
 
IRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source IdentificationIRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source Identification
 
An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...
 
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIdentifying Malicious Data in Social Media
Identifying Malicious Data in Social Media
 
Eh34803812
Eh34803812Eh34803812
Eh34803812
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networks
 
An epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanupAn epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanup
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensics
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Secure and Reliable Data Transmission in Generalized E-Mail

  • 1. M.Vijayapriya et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.192-196 www.ijera.com 192|P a g e Secure and Reliable Data Transmission in Generalized E-Mail 1# M.Vijayapriya,PG Scholar,2# N.Anandh,Assistant Professor 3# B.Gohila vani,PG Scholar,4# A.Selvaraj,Assistant Professor Department of CSE,Anna University Muthayammal Engineering College,Namakkal-637 408 Abstract Email is a basic service for computer users, while email malware poses critical security threats. The technique of email-borne malware will be highly effective. Email malware focuses on modeling the propagation dynamics which is a fundamental technique for developing countermeasures to reduce email malware’s spreading speed and prevalence. Modern email malware exhibits two new features, reinjection and self-start. Reinjection is an infected user sends out malware copies whenever this user visits the malicious hyperlinks or attachments. Self- start refers to the behavior that malware starts to spread whenever compromised computers restart or certain files are visited. For address this problem, to derive a novel difference equation based analytical model by introducing a new concept of virtual dirty user. Propose a new analytical model to enhanced OLSR protocol which is a trust based technique to secure the OLSR nodes against the attack. The proposed solution called EOLSR is an enhancement of the basic OLSR routing protocol, which will be able to detect the presence of malicious nodes in the network. Keywords: Network security, email malware, propagation modeling I. INTRODUCTION Malware short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of executable code, scripts, active content, and other software. With the escalating growth of communication and information systems, a new term and acronym invaded the digital world called as malware. It is a general term, which stands for malicious software and has many shapes (codes, scripts, active content and others). It has been designed to achieve some targets such as, collecting sensitive data, accessing private computer systems, even sometimes harming the systems. The malware can reach the systems in different ways and through multiple media; the most common way is the downloading process from the internet, once the malware finds its way to the systems, based on the functions of the malware the drama will begin. II. RELATED WORK In [1] C.C. Zou, D. Towsley, and W. Gong et al presents for there an electronic mail worm imitation replica that the books for the behaviors of correspondence users, counting email examination time and the likelihood of aperture and communication superfluous. Our annotations of news item lists recommend that an Internet send arrangement follows a heavy-tailed allocation in stipulations of swelling degrees, and facsimile it as an influence law friendship. To modify the topological collision, we evaluate message larva broadcast on power law topology with maggot dissemination on two other topologies: small planet topology and accidental grid topology. In [2] S. Wen, W. Zhou, Y. Wang, W. Zhou et al presents A familiar examination for the preferable positions o awkward worm dissemination is at the greatly coupled nodes. To appraise the cause on uncomfortable maggot broadcasting by quarantining firm nodes, we recommend an illustration to symbolize the scattering practice of topological worms. Firstly, a communicable swelling can proliferate worms, and a susceptible user can be contaminated and turn into a novel communicable bump. In [3] Y. Wang, S. Wen, S. Cesare et al presents Research on larva broadcast has been conducted for more than a decade. However, customary models misjudge the scale of the tainted net that leads to proliferation errors because of partial and mistaken psychotherapy of the circulation course of action between each pair of nodes in the complex. For focus on analyzing the shape of broadcast errors and examined the collision of eliminating errors on the proliferation practice on two unusual types of worms. We encompass revealed by simulations that errors augment as added dissemination cycles are bent and quantified the errors under special transmission scenarios RESEARCH ARTICLE OPEN ACCESS
  • 2. M.Vijayapriya et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.192-196 www.ijera.com 193|P a g e In [4] S.M. Cheng, W.C. Ao, P.Y. Chen et al presents A amalgam malware on elegant phones can be propagated by both end-to-end messaging military via delicate social transportation and short- range wireless communiqué navy via spatial social interactions. stimulated from epidemiology, propose a novel differential equation-based model to analyze the mixed behaviors of delocalized infection and ripple based propagation for the hybrid malware in generalized social networks consisting of personal and spatial social relations. In [5] R. Thommes and M. Coates et al presents the fame of peer-to-peer (P2P) networks makes them an gorgeous objective to the creators of viruses and extra malevolent regulations. Freshly a amount of viruses premeditated explicitly to widen via P2P networks boast emerged. Toxic waste has also turned into ever more widespread as patent holders inject multiple decoy versions in order to hinder entry allotment. In this manuscript gain deterministic epidemiological models for the transmission of a P2P germ during a P2P network and the spreading of effluence. III. P2P MODEL NETWORK The recommend geometric models, which have capture the truthful topological in sequence. The sequential dynamics and the spatial dependence dilemma in the propagation modeling. nevertheless, all these model cannot present the reinfection and self-start process of up to date email malware. Their moving parts study the final stable state of epidemic spread based on SIS models, whereas we study the transient propagation dynamics of modern email malware. Second, there are some works which characterize the propagation dynamics of isomorphic malware, such as P2P malware, mobile malware and malware on online social networks. The differential equations to present the propagation of P2P malware through a P2P network. The models are proposed for the mobile environment by presuming nodes meet each other with a probability. These works assume all individual devices are homogeneously mixed, and thus, they are unlikely to work in the real mobile environment. The models present the propagation of online social malware by simulations. Since these models are based on non reinfection, they cannot be adopted to present the propagation of modern email malware. IV. EXISTING SYSTEM These observations become the motivation of work to develop a new analytical model that can precisely present the propagation dynamics of the modern email malware. The spreading procedure can be characterized by a Susceptible-Infected- Immunized (SII) process. The major contributions of this paper are listed below: To introduce a new concept of virtual nodes to address the underestimation in previous work, which can represent the situation of a user sending out one more round of malware copies each time this user gets infected.Perform empirical and theoretical study to investigate why and how the proposed SII model is superior to existing models. Modern email malware exhibits two new features, reinfection and self-start. For address this problem, to derive a novel difference equation based analytical model by introducing a new concept of virtual infected user. A new analytical model to capture the interactions among the infected email users by a set of difference equations, which is together describe the overall propagation of the modern email malware. The proposed a novel SII model for the propagation of modern email malware. This model is able to address two critical processes unsolved in previous models: the reinfection and the self-start. By introducing a group of difference equations and virtual nodes, it presented the repetitious spreading processes caused by the reinfection and the self-start. 4.1 LIMITATIONS  It is malicious software  Does not achieve greater accuracy  Malware called topological scanning malware that spread based on topology information V. PROPOSED SYSTEM Analyzing the attack, propose a mechanism called enhanced OLSR (EOLSR) protocol which is a trust based technique to secure the OLSR nodes against the attack. The proposed solution called EOLSR is an enhancement of the basic OLSR routing protocol, which will be able to detect the presence of malicious nodes in the network. In proposed system assumes that all the nodes are authenticated and can participate in communication i.e., all nodes are authorized nodes. In our protocol is able to achieve routing security with increase in packet delivery ratio and reduction in packet loss rate. The Optimized Link State Routing Protocol (OLSR) is an IP routing protocol optimized for mobile ad hoc networks, which can also be used on other wireless ad hoc networks. OLSR is a proactive link-state routing protocol, which uses hello and Topology Control (TC) messages to discover and then disseminate link state information throughout the mobile ad hoc network. Individual nodes use this topology information to compute next hop destinations for all nodes in the
  • 3. M.Vijayapriya et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.192-196 www.ijera.com 194|P a g e network using shortest hop forwarding paths.Link- state routing protocols such as Open Shortest Path First (OSPF) and IS-IS select a designated router on every link to perform flooding of topology information. In wireless ad hoc networks, there is different notion of a link, packets can and do go out the same interface; hence, a different approach is needed in order to optimize the flooding process. Using Hello messages the OLSR protocol at each node discovers 2-hop neighbor information and performs a distributed election of a set of multipoint relays (MPRs). Nodes select MPRs such that there exist a path to each of its 2-hop neighbors via a node selected as an MPR. These MPR nodes then source and forward TC messages that contain the MPR selectors. This functioning of MPRs makes OLSR unique from other link state routing protocols in a few different ways: The forwarding path for TC messages is not shared among all nodes but varies depending on the source, only a subset of nodes source link state information, not all links of a node are advertised but only those that represent MPR selections.Since link-state routing requires the topology database to be synchronized across the network, OSPF and IS-IS perform topology flooding using a reliable algorithm. Such an algorithm is very difficult to design for ad hoc wireless networks, so OLSR doesn't bother with reliability; it simply floods topology data often enough to make sure that the database does not remain unsynchronized for extended periods of time. 5.1 Network Formation It consist of a set of nodes .Each and every node should have some kinds of ID, which is like N1, N2,…and Nn. Each node communicate with another rnode.all the nodes are authenticated 5.2 Attacker Performance Malware to disrupt computer operation, gather sensitive information, or gain access to private computer systems. For modern email malware, recall that a compromised user may send out malware email copies to neighbors every time the user visits those malware hyperlinks or attachments. SYSTEM ARCHITECTURE: Fig 5:system architecture 5.3 Data Transfer Through the Virtual Node Virtual node can represent the situation of a user sending out one more round of malware copies each time this user gets infected. In order to represent the repetitious spreading process of the reinfection and the self-start, introduce virtual nodes to present the infection caused by infected users opening the malware email copy. 5.4 Detection of Attackers To analyze the vulnerabilities of a pro-active routing protocol called optimized link state routing (OLSR) against a specific type of denial-of-service (DOS) attack called node isolation attack. Analyzing the attack, propose a mechanism called enhanced OLSR (EOLSR) protocol which is a trust based technique to secure the OLSR nodes against the attack. The technique is capable of finding whether a Social networks Email Malware Reinfection Self-start Malware behavior Malware starts to spread malware copies Disturb the computer operation Email malware exhibits two new features Susceptible infected immunized (SII) process Capture the Interactions among the infected email users Estimation accuracy To introduce OLSR protocol for secure the node against the attack
  • 4. M.Vijayapriya et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.192-196 www.ijera.com 195|P a g e node is advertising correct topology information or not by verifying its Hello packets, thus detecting node isolation attacks. PERFORMANCE EVALUATION VI. CONCLUSION Susceptible-Infected-Susceptible (SII) model for the propagation of modern email malware and is used to address two critical processes unsolved in previous models: the reinfection and the self-start. The experiments showed that the result of Optimal Link State Routing Protocol (OLSR) model is close to the simulations. Propose a new analytical model to enhanced OLSR protocol which is a trust based technique to secure the OLSR nodes against the attack. The proposed solution called EOLSR is an enhancement of the basic OLSR routing protocol, which will be able to detect the presence of malicious nodes in the network. REFERENCES [1] C.C. Zou, D. Towsley, and W. Gong, “Modeling and Simulation Study of the Propagation and Defense of Internet E-Mail Worms,” IEEE Trans. Dependable and Secure Computing, vol. 4, no. 2, pp. 105- 118, Apr.-June 2007. [2] S. Wen, W. Zhou, Y. Wang, W. Zhou, and Y. Xiang, “Locating Defense Positions for Thwarting the Propagation of Topological Worms,” IEEE Comm. Letters, vol. 16, no. 4, pp. 560-563, Apr. 2012. [3] Y. Wang, S. Wen, S. Cesare, W. Zhou, and Y. Xiang, “Eliminating Errors in Worm Propagation Models,” IEEE Comm. Letters, vol. 15, no. 9, pp. 1022-1024, Sept. 2011. [4] S.M. Cheng, W.C. Ao, P.Y. Chen, and K.C. Chen, “On Modeling Malware Propagation in Generalized Social Networks,” IEEE Comm. Letters, vol. 15, no. 1, pp. 25-27, Jan. 2011. [5] R. Thommes and M. Coates,“Epidemiological Modelling of PeertoPeer Viruses and Pollution,” Proc. IEEE INFOCOM ’06, pp. 1-12, 2006. [6] M. Fossi and J. Blackbird, “Symantec Internet Security Threat Report 2010,” technical report Symantec Corporation, Mar. 2011. [7] P. Wood and G. Egan, “Symantec Internet Security Threat Report 2011,” technical report, Symantec Corporation, Apr. 2012. [8] Z. Chen and C. Ji, “Spatial-Temporal Modeling of Malware Propagation in Networks,” IEEE Trans. Neural Networks, vol. 16, no. 5, pp. 1291-1303, Sept. 2005. [9] C. Gao, J. Liu, and N. Zhong, “Network Immunization and Virus Propagation in Email Networks: Experimental Evaluation and Analysis,” Knowledge and Information Systems, vol. 27, pp. 253-279, 2011. [10] J. Xiong, “Act: Attachment Chain Tracing Scheme for Email Virus Detection and Control,” Proc. ACM Workshop Rapid Malcode (WORM ’04), pp. 11-22, 2004. [11] S. Wen, W. Zhou, J. Zhang, Y. Xiang, W. Zhou, and W. Jia, “Modeling Propagation Dynamics of Social Network Worms,” IEEE Trans. Parallel and Distributed Systems, vol. 24, no. 8, pp. 1633- 1643, Aug. 2013. [12] (1999) Cert, advisory ca-1999-04, Melissa Macro Virus, http:// www.cert.org/advisories/CA-1999-04.html, 2009. [13] Cert, Advisory ca-2000-04, Love Letter Worm, http://www.cert. org/advisories/CA- 2000-04.html, 2000. [14] M. Calzarossa and E. Gelenbe, Performance Tools and Applications to Networked Systems: Revised Tutorial Lectures. Springer-Verlag, 2004. [15] G. Serazzi and S. Zanero, “Computer Virus Propagation Models,” Proc. 11th IEEE/ACM Int’l Conf. Modeling, Analysis and Simulations of Computer and Telecomm. Systems (MASCOTS ’03), pp. 1-10, Oct. 2003. [16] B. Rozenberg, E. Gudes, and Y. Elovici, “SISR: A New Model for Epidemic Spreading of Electronic Threats,” Proc. 12th Int’l Conf. Information Security, pp. 242- 249, 2009. [17] C. Wong, S. Bielski, J.M. McCune, and C. Wang,“A Study of Mass-Mailing Worms,” Proc. ACM Workshop Rapid Malcode (WORM ’04), pp. 1-10, 2004. [18] D. Moore and C. Shannon, “The Nyxem Email Virus: Analysis and Inferences,” technical report, CAIDA, Feb. 2006. [19] Symantec, A-Z Listing of Threats and Risks, http://www. symantec.com/security Response, 2012.
  • 5. M.Vijayapriya et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.192-196 www.ijera.com 196|P a g e [20] C. Zou, Internet Email Worm Propagation Simulator, http:// www.cs.ucf.edu/czou/research/emailWormS imulationhtml , 2005. [21] M. Boguna, R. Pastor-Satorras, and A. Vespignani, “Epidemic Spreading in Complex Networks with Degree Correlations,” Lecture Notes in Physics, vol. 625, pp. 1-23, 2003. [22] Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, “Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint,” Proc. 22nd Int’l Symp. Reliable Distributed Systems (SRDS), pp. 25-34, 2003. [23] A.J. Ganesh, L. Massouli, and D.F. Towsley,“The Effect of Network Topology on the Spread of Epidemics,” Proc. IEEE INFOCOM ’05, pp. 1455-1466, 2005. [24] D. Chakrabarti, J. Leskovec, C. Faloutsos, S. Madden, C. Guestrin, and M. Faloutsos, “Information Survival Threshold in Sensor and p2p Networks,” Proc. IEEE INFOCOM ’07, pp.