计算机科学 ›› 2026, Vol. 53 ›› Issue (2): 442-453.doi: 10.11896/jsjkx.250300041

• 信息安全 • 上一篇    

基于用户行为的云邮件防御资源分配方法

张万友, 宋礼鹏   

  1. 山东大学机电与信息工程学院 山东 威海 264200
  • 收稿日期:2025-03-10 修回日期:2025-06-07 发布日期:2026-02-10
  • 通讯作者: 宋礼鹏 (slp880@sdu.edu.cn)
  • 作者简介:(zhwanyou@foxmail.com)

Cloud Email Defense Resource Allocation Method Based on User Behavior

ZHANG Wanyou, SONG Lipeng   

  1. School of Mechanical,Electrical & Information Engineering,Shandong University,Weihai,Shandong 264200,China
  • Received:2025-03-10 Revised:2025-06-07 Online:2026-02-10
  • About author:ZHANG Wanyou,born in 1998,postgraduate.His main research interests include big data security and cloud computing security.
    SONG Lipeng,born in 1975,Ph.D,professor,Ph.D supervisor.His main research interests include artificial intelligence security and big data security.

摘要: 近年来,随着云邮件应用的普及,用户数量不断增加,钓鱼攻击等邮件安全威胁日益严重。有效的防御资源分配成为保障云邮件系统稳定运行的关键。然而,现有的防御资源分配方法往往未充分考虑用户行为、多个云节点间的关联关系和横向钓鱼攻击问题,难以精准应对复杂的安全威胁,导致资源利用效率低下和防御效果不佳。为解决这一问题,提升云邮件节点的安全性和资源利用率,提出了一种基于用户行为的云邮件防御资源分配方法。首先,构建了云邮件节点风险评估模型,综合评估钓鱼邮件攻击成功率以及单个云邮件节点和多个关联节点的云端风险。随后,设计了单个节点防御资源动态分配算法和多个相互关联节点防御资源协同分配算法,根据用户登录概率、信任关系、行为模式、节点拥有的防御资源量和实时威胁态势动态调整资源分配策略。实验结果表明,与现有防御资源分配方法相比,所提方法能够实现节点之间资源的协同调配,有效提高了资源利用率并取得了最低全天系统总损失值,表现出了优越的效果,为云邮件节点的防御资源分配提供了更优的解决方案。

关键词: 云邮件, 用户行为, 钓鱼邮件, 防御策略, 资源分配

Abstract: In recent years,with the widespread adoption of cloud-based email applications,the number of users has steadily increased,and security threats such as phishing attacks have become more prevalent.Effective defense resource allocation has thus become crucial for ensuring the stable operation of cloud email systems.However,existing resource allocation methods often fail to adequately consider factors such as user behavior,the interrelationships between multiple cloud nodes,and lateral phishing attacks,leading to inefficiencies in resource utilization and suboptimal defense performance.To address these issues and enhance the security and resource utilization of cloud email nodes,this paper proposes a user behavior-based defense resource allocation me-thod.Firstly,a risk assessment model for cloud email nodes is developed,which comprehensively evaluates the success rate of phishing attacks and the cloud risks associated with both individual nodes and multiple interconnected nodes.Next,dynamic defense resource allocation algorithms are designed for both individual nodes and collaborative resource allocation across multiple interlinked nodes.These algorithms adjust resource allocation strategies in real-time based on factors such as user login probabilities,trust relationships,behavior patterns,the available defense resources at each node,and the current threat landscape.Experimental results show that,compared to existing methods,the proposed approach enables collaborative resource allocation,improves utilization,achieves the lowest system loss,and offers a better solution for cloud email node defense resource allocation.

Key words: Cloud email, User behavior, Phishing emails, Defense strategies, Resource allocation

中图分类号: 

  • TP393
[1]RADICATI.GROUP.Email statistics report 2022-2026[R/OL].https://www.radicati.com/wp/wp-content/uploads/2022/11/Email-Statistics-Report-2022-2026-Executive-Summary.pdf.
[2]RAO S,VERMA A K,BHATIA T.A review on social spam detection:Challenges,open is-sues,and future directions[J].Expert Systems with Applications,2021,186:115742.
[3]MACAS M,WU C,FUERTES W.A survey on deep learning for cybersecurity:Progress,challenges,and opportunities[J].Computer Networks,2022,212:109032.
[4]BOUKE M A,ABDULLAH A,ALSHATEBI S H,et al.The intersection of targeted advertising and security:Unraveling the mystery of overheard conversations[J].Telematics and Informatics Reports,2023,11:100092.
[5]ALKARAKI J N,GAWANMEH A,FACHKHA C.Blockchain for email security:A perspective on existing and potential solutions for phishing attacks[C]//2023 Fifth International Confe-rence on Blockchain Computing and Applications(BCCA).IEEE,2023:404-411.
[6]BOUKE M A,ABDULLAH A,UDZIR N I,et al.Overcoming the challenges of data lack,leakage,and dimensionality in intrusion detection systems:a comprehensive review[J].Journal of Communication and Information Systems,2024,39(1):22-34.
[7]WONGWATKIT R,RAKTHAM M,PHAWANANTHAPHUTI T.Intelligent blacklist security system for protecting spammer in corporate email solution:A case of corporate email ser-vice provider in thailand[C]//2022 24th International Confe-rence on Advanced Communication Technology(ICACT).IEEE,2022:387-391.
[8]SURWADE A U.Blocking Phishing e-mail by extracting header information of e-mails[C]//2020 International Conference on Smart Innovations in Design,Environment,Management,Planning and Computing(ICSIDEMPC).IEEE,2020:151-155.
[9]BOUKE M A,ALRAMLI O I,ABDULLAH A.XAIRF-WFP:a novel XAI-based random forest classifier for advanced email spam detection[J].International Journal of Information Security,2025,24(1):5.
[10]LI X,ZHANG D,WU B.Detection method of phishing email based on persuasion principle[C]//2020 IEEE 4th Information Technology,Networking,Electronic and Automation Control Conference(ITNEC).IEEE,2020:571-574.
[11]HEIDING F,SCHNEIER B,VISHWANATH A,et al.Devising and detecting phishing emails using large language models[J].arXiv:2308.12287,2023.
[12]SYMANTEC.Symantec cloud email security[EB/OL].https://docs.broadcom.com/doc/emailsecurity-cloud-2019-11-service-description-en.
[13]XIAO D,JIANG M Y.Malicious Mail Filtering and Tracing System Based on KNN and Improved LSTM Algorithm[C]//2020 IEEE International Symposium on Dependable,Autonomic and Secure Computing(DASC).IEEE,2020:222-229.
[14]WEI W,WANG Q,XU H,et al.Highly complex resource scheduling for stochastic demands in heterogeneous clouds[J].Journal of Grid Computing,2021,19:1-16.
[15]WEI W,WANG Q,YANG W,et al.Efficientstochastic scheduling for highly complex resource placement in edge clouds[J].Journal of Network and Computer Applications,2022,202:103365.
[16]WEI W,LI H,YANG W.Cost-effective stochastic resourceplacement in edge clouds with horizontal and vertical sharing[J].Future Generation Computer Systems,2023,138:213-225.
[17]GILL S S,GARRAGHAN P,STANKOVSKI V,et al.Holistic resource management for sustainable and reliable cloud computing:An innovative solution to global challenge[J].Journal of Systems and Software,2019,155:104-129.
[18]AHLAWAT C,KRISHNAMURTHI R.Q-learning with function Approximator for clustering based Optimal resource Allocation in fog environment[C]//Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing.2022:127-135.
[19]JEONG B,BAEK S,PARK S,et al.Stable and efficient resource management using deep neural network on cloud computing[J].Neurocomputing,2023,521:99-112.
[20]YU B,LI X H,PAN C Y,et al.Edge-cloud collaborative resource allocation algorithm based on deep reinforcement learning[J].Chinese Journal of Computer Science,2022,49(7):248-253.
[21]GAN D,GE X,LI Q.An optimal transport-based federated rein-forcement learning approach for resource allocation in cloud-edge collaborative IoT[J].IEEE Internet of Things Journal,2023,11(2):2407-2419.
[22]NAWROCKI P,SMENDOWSKI M.FinOps-driven optimization of cloud resource usage for high-performance computing using machine learning[J].Journal of Computational Science,2024,79:102292.
[23]NEEMA G,KADAN A B,VIJAYAN V P.Multi-objective load balancing in cloud infrastructure through fuzzy based decision making and genetic algorithm based optimization[J].IAES International Journal of Artificial Intelligence,2023,12(2):678.
[24]YANG Z M,ZUO L L,JI W.Joint optimization method for node deployment and resource allocation based on edge-end collaboration[J].Chinese Journal of Computer Science,2024,51(S2):665-671.
[25]SHAIK M B,REDDY K S,CHOKKANATHAN K,et al.A Hybrid Particle Swarm Optimization and Simulated Annealing with Load Balancing Mechanism for Resource Allocation in Fog-Cloud Environments[J].IEEE Access,2024,12:172439-172450.
[26]SENTHIL KUMAR A M,PADMANABAN K,VELMURU-GAN A K,et al.A novel resource management framework in a cloud computing environment using hybrid cat swarm BAT(HCSBAT) algorithm[J].Distributed and Parallel Databases,2023,41(1):53-63.
[27]NARWAL A.Resource Utilization Based on Hybrid WOA-LOA Optimization with Credit Based Resource Aware Load Balancing and Scheduling Algorithm for Cloud Computing[J].Journal of Grid Computing,2024,22(3):61.
[28]PRECIADO V M,ZARGHAM M,ENYIOHA C,et al.Optimal resource allocation for network protection against spreading processes[J].IEEE Transactions on Control of Network Systems,2014,1(1):99-108.
[29]WANG M,SONG L.Efficient defense strategy against spam and phishing email:An evolutionary game model[J].Journal of Information Security and Applications,2021,61:102947.
[30]OGURA M,PRECIADO V M,MASUDA N.Optimal Con-tainment of Epidemics over Temporal Activity-Driven Networks[J].SIAM Journal on Applied Mathematics,2019:79(3):986-1006.
[31]HAMOUDA E,ELHAFSI M,SON J.Securing Network Resilience:Leveraging Node Centrality for Cyberattack Mitigation and Robustness Enhancement[J].Information Systems Frontiers,2024,26(1):1-16.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!