Abstract
Email worm, as the name implies, spreads through infected email messages. The worm may be carried by attachment, or the email may contain links to an infected website. When the user opens the attachment, or clicks the link, the host is immediately infected. Email worms use the vulnerability of the email software of the host machine and sends infected emails to the addresses stored in the address book. In this way, new machines get infected. Examples of email worms are “W32.mydoom.M@mm”, “W32.Zafi.d”, “W32.LoveGate.w”, “W32.Mytob.c”, and so on. Worms do a lot of harm to computers and people. They can clog the network traffic, cause damage to the system and make the system unstable or even unusable.
Similar content being viewed by others
References
Martin, S., Sewani, A., Nelson, B., Joseph, K.C.A.D.: A Two-Layer Approach for Novel Email Worm Detection, http://www.cs.berkeley.edu/~anil/papers/SRUTI_submitted.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Masud, M.M., Khan, L., Al-Shaer, E. (2006). Email Worm Detection Using Naïve Bayes and Support Vector Machine. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_110
Download citation
DOI: https://doi.org/10.1007/11760146_110
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34478-0
Online ISBN: 978-3-540-34479-7
eBook Packages: Computer ScienceComputer Science (R0)