计算机科学 ›› 2026, Vol. 53 ›› Issue (2): 442-453.doi: 10.11896/jsjkx.250300041
• 信息安全 • 上一篇
张万友, 宋礼鹏
ZHANG Wanyou, SONG Lipeng
摘要: 近年来,随着云邮件应用的普及,用户数量不断增加,钓鱼攻击等邮件安全威胁日益严重。有效的防御资源分配成为保障云邮件系统稳定运行的关键。然而,现有的防御资源分配方法往往未充分考虑用户行为、多个云节点间的关联关系和横向钓鱼攻击问题,难以精准应对复杂的安全威胁,导致资源利用效率低下和防御效果不佳。为解决这一问题,提升云邮件节点的安全性和资源利用率,提出了一种基于用户行为的云邮件防御资源分配方法。首先,构建了云邮件节点风险评估模型,综合评估钓鱼邮件攻击成功率以及单个云邮件节点和多个关联节点的云端风险。随后,设计了单个节点防御资源动态分配算法和多个相互关联节点防御资源协同分配算法,根据用户登录概率、信任关系、行为模式、节点拥有的防御资源量和实时威胁态势动态调整资源分配策略。实验结果表明,与现有防御资源分配方法相比,所提方法能够实现节点之间资源的协同调配,有效提高了资源利用率并取得了最低全天系统总损失值,表现出了优越的效果,为云邮件节点的防御资源分配提供了更优的解决方案。
中图分类号:
| [1]RADICATI.GROUP.Email statistics report 2022-2026[R/OL].https://www.radicati.com/wp/wp-content/uploads/2022/11/Email-Statistics-Report-2022-2026-Executive-Summary.pdf. [2]RAO S,VERMA A K,BHATIA T.A review on social spam detection:Challenges,open is-sues,and future directions[J].Expert Systems with Applications,2021,186:115742. [3]MACAS M,WU C,FUERTES W.A survey on deep learning for cybersecurity:Progress,challenges,and opportunities[J].Computer Networks,2022,212:109032. [4]BOUKE M A,ABDULLAH A,ALSHATEBI S H,et al.The intersection of targeted advertising and security:Unraveling the mystery of overheard conversations[J].Telematics and Informatics Reports,2023,11:100092. [5]ALKARAKI J N,GAWANMEH A,FACHKHA C.Blockchain for email security:A perspective on existing and potential solutions for phishing attacks[C]//2023 Fifth International Confe-rence on Blockchain Computing and Applications(BCCA).IEEE,2023:404-411. [6]BOUKE M A,ABDULLAH A,UDZIR N I,et al.Overcoming the challenges of data lack,leakage,and dimensionality in intrusion detection systems:a comprehensive review[J].Journal of Communication and Information Systems,2024,39(1):22-34. [7]WONGWATKIT R,RAKTHAM M,PHAWANANTHAPHUTI T.Intelligent blacklist security system for protecting spammer in corporate email solution:A case of corporate email ser-vice provider in thailand[C]//2022 24th International Confe-rence on Advanced Communication Technology(ICACT).IEEE,2022:387-391. [8]SURWADE A U.Blocking Phishing e-mail by extracting header information of e-mails[C]//2020 International Conference on Smart Innovations in Design,Environment,Management,Planning and Computing(ICSIDEMPC).IEEE,2020:151-155. [9]BOUKE M A,ALRAMLI O I,ABDULLAH A.XAIRF-WFP:a novel XAI-based random forest classifier for advanced email spam detection[J].International Journal of Information Security,2025,24(1):5. [10]LI X,ZHANG D,WU B.Detection method of phishing email based on persuasion principle[C]//2020 IEEE 4th Information Technology,Networking,Electronic and Automation Control Conference(ITNEC).IEEE,2020:571-574. [11]HEIDING F,SCHNEIER B,VISHWANATH A,et al.Devising and detecting phishing emails using large language models[J].arXiv:2308.12287,2023. [12]SYMANTEC.Symantec cloud email security[EB/OL].https://docs.broadcom.com/doc/emailsecurity-cloud-2019-11-service-description-en. [13]XIAO D,JIANG M Y.Malicious Mail Filtering and Tracing System Based on KNN and Improved LSTM Algorithm[C]//2020 IEEE International Symposium on Dependable,Autonomic and Secure Computing(DASC).IEEE,2020:222-229. [14]WEI W,WANG Q,XU H,et al.Highly complex resource scheduling for stochastic demands in heterogeneous clouds[J].Journal of Grid Computing,2021,19:1-16. [15]WEI W,WANG Q,YANG W,et al.Efficientstochastic scheduling for highly complex resource placement in edge clouds[J].Journal of Network and Computer Applications,2022,202:103365. [16]WEI W,LI H,YANG W.Cost-effective stochastic resourceplacement in edge clouds with horizontal and vertical sharing[J].Future Generation Computer Systems,2023,138:213-225. [17]GILL S S,GARRAGHAN P,STANKOVSKI V,et al.Holistic resource management for sustainable and reliable cloud computing:An innovative solution to global challenge[J].Journal of Systems and Software,2019,155:104-129. [18]AHLAWAT C,KRISHNAMURTHI R.Q-learning with function Approximator for clustering based Optimal resource Allocation in fog environment[C]//Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing.2022:127-135. [19]JEONG B,BAEK S,PARK S,et al.Stable and efficient resource management using deep neural network on cloud computing[J].Neurocomputing,2023,521:99-112. [20]YU B,LI X H,PAN C Y,et al.Edge-cloud collaborative resource allocation algorithm based on deep reinforcement learning[J].Chinese Journal of Computer Science,2022,49(7):248-253. [21]GAN D,GE X,LI Q.An optimal transport-based federated rein-forcement learning approach for resource allocation in cloud-edge collaborative IoT[J].IEEE Internet of Things Journal,2023,11(2):2407-2419. [22]NAWROCKI P,SMENDOWSKI M.FinOps-driven optimization of cloud resource usage for high-performance computing using machine learning[J].Journal of Computational Science,2024,79:102292. [23]NEEMA G,KADAN A B,VIJAYAN V P.Multi-objective load balancing in cloud infrastructure through fuzzy based decision making and genetic algorithm based optimization[J].IAES International Journal of Artificial Intelligence,2023,12(2):678. [24]YANG Z M,ZUO L L,JI W.Joint optimization method for node deployment and resource allocation based on edge-end collaboration[J].Chinese Journal of Computer Science,2024,51(S2):665-671. [25]SHAIK M B,REDDY K S,CHOKKANATHAN K,et al.A Hybrid Particle Swarm Optimization and Simulated Annealing with Load Balancing Mechanism for Resource Allocation in Fog-Cloud Environments[J].IEEE Access,2024,12:172439-172450. [26]SENTHIL KUMAR A M,PADMANABAN K,VELMURU-GAN A K,et al.A novel resource management framework in a cloud computing environment using hybrid cat swarm BAT(HCSBAT) algorithm[J].Distributed and Parallel Databases,2023,41(1):53-63. [27]NARWAL A.Resource Utilization Based on Hybrid WOA-LOA Optimization with Credit Based Resource Aware Load Balancing and Scheduling Algorithm for Cloud Computing[J].Journal of Grid Computing,2024,22(3):61. [28]PRECIADO V M,ZARGHAM M,ENYIOHA C,et al.Optimal resource allocation for network protection against spreading processes[J].IEEE Transactions on Control of Network Systems,2014,1(1):99-108. [29]WANG M,SONG L.Efficient defense strategy against spam and phishing email:An evolutionary game model[J].Journal of Information Security and Applications,2021,61:102947. [30]OGURA M,PRECIADO V M,MASUDA N.Optimal Con-tainment of Epidemics over Temporal Activity-Driven Networks[J].SIAM Journal on Applied Mathematics,2019:79(3):986-1006. [31]HAMOUDA E,ELHAFSI M,SON J.Securing Network Resilience:Leveraging Node Centrality for Cyberattack Mitigation and Robustness Enhancement[J].Information Systems Frontiers,2024,26(1):1-16. |
|
||