Instant messaging security

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Instant Messaging (IM), a popular communication system, is inevitably exposed to security attacks. With its commercial and government applications, its secure and reliable service becomes indispensable. In this chapter, we introduce IM system and its security with an emphasis on the most damaging threats of IM spam and worm. Due to the real-time nature of IM services, the existing Internet and e-mail spam and worm defense techniques are not directly applicable to IM systems; new and effective methods are urgently needed for coping with IM network security problems. After a review of the existing IM spam and worm defense approaches, we present our solutions for filtering IM spam and controlling IM worm, including smart worm. Based on the characteristics of IM system architecture and services, as well as worm spread patterns, we propose an analytical model with statistical branching process and provide a detailed analysis. As a result, we design new and effective defense procedures, including topology based tracing and quarantine and topology-aware throttling. "Introduction" contains an introduction to IM system and its security threats along with a survey of various defense methods. "Instant Messaging Spam: SPIM" is on IM spam filtering. "Instant Messaging Worm" presents a mathematical model and analysis of IM worm along with its defense mechanisms. © 2011, IGI Global.

Cite

CITATION STYLE

APA

Liu, Z., Shu, G., & Lee, D. (2011). Instant messaging security. In Network Security, Administration and Management: Advancing Technology and Practice (pp. 288–323). IGI Global. https://doi.org/10.4018/978-1-60960-777-7.ch015

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free