Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.6.37

Design and Implementation of an E-mail Worm-Virus Filtering System on MS Windows  

Choi Jong-Cheon (Dankook University)
Chang Hye-Young (Dankook University)
Cho Seong-Je (Dankook University)
Abstract
Recently, the malicious e-mail worm-viruses have been widely spreaded over the Internet. If the recipient opens the e-mail attachment or an e-mail itself that contains the worm-virus, the worm-virus can be activated and then cause a tremendous damage to the system by propagating itself to everyone on the mailing list in the user's e-mail package. In this paper, we have designed and implemented two methods blocking e-mail worm-viruses. In the fist method, each e-mail is transmitted only by sender activity such as the click of button on a mail client application. In the second one, we insert the two modules into the sender side, where the one module transforms a recipient's address depending on a predefined rule only in time of pushing button and the other converts the address reversely with the former module whenever an e-mail is sent. The lader method also supports a polymorphism model in order to cope with the new types of e-mail worm-virus attacks. The two methods are designed not to work for the e-mail viruses. There is no additional fraction on the receiver's side of the e-mail system. Experimental results show that the proposed methods can screen the e-mail worm-viruses efficiently with a low overhead.
Keywords
e-mail worm-virus; user activity; polymorphism; transformation module; restoration module;
Citations & Related Records
연도 인용수 순위
  • Reference
1 'MS Windows Plaform SDK', Document, Microsoft, 2002
2 David Wood, 'Programming Internet Email', O'reilly, 1999
3 이현우, 백원민, 하도윤, 김상철, '메일필터링을 통한 E-mail 보안', 한국정보보호진흥원, 2001
4 http://info.ahnlab.com/securityinfo/info_view.jsp?seq=5968&category=02
5 http://www.cert.org/advisories/CA-2000-04.html
6 Jonathan B. Postel, 'Simple Mail Transfer Protocol', RFC 821, 1982
7 William Stallings, 'Operating Systems', 4th Edition, Chapter 15, Prentice Hall, 2000
8 KrCERT, 인터넷 침해사고 동향 및 분석 월보, 한국정보보호진흥원, 2005, 5
9 M. Rose, 'Post Office Protocol - Version 3', RFC 1081, 1988
10 Eric Allman, 'Sendmail Installation and Operation Guide', No. 8, Sendmail. Inc, 2001
11 'MS Windows DDK Document', Microsoft, 2001
12 N. Borenstein, Bellcore, N. Freed, Innosoft, RFC1521-MIME(Multipurpose Internet Mail Extensions), IETF, 1993
13 http://www.krcert.or.kr/
14 이성욱, '정적 분석과 코드 변환을 이용한 적극적인 악성 스크립트 대응', 아주대학교 박사학위논문, 2002
15 Roger A. Grimes, 'Malicious Mobile Code', O'reilly, 2001