Computer Science ›› 2026, Vol. 53 ›› Issue (2): 442-453.doi: 10.11896/jsjkx.250300041

• Information Security • Previous Articles    

Cloud Email Defense Resource Allocation Method Based on User Behavior

ZHANG Wanyou, SONG Lipeng   

  1. School of Mechanical,Electrical & Information Engineering,Shandong University,Weihai,Shandong 264200,China
  • Received:2025-03-10 Revised:2025-06-07 Published:2026-02-10
  • About author:ZHANG Wanyou,born in 1998,postgraduate.His main research interests include big data security and cloud computing security.
    SONG Lipeng,born in 1975,Ph.D,professor,Ph.D supervisor.His main research interests include artificial intelligence security and big data security.

Abstract: In recent years,with the widespread adoption of cloud-based email applications,the number of users has steadily increased,and security threats such as phishing attacks have become more prevalent.Effective defense resource allocation has thus become crucial for ensuring the stable operation of cloud email systems.However,existing resource allocation methods often fail to adequately consider factors such as user behavior,the interrelationships between multiple cloud nodes,and lateral phishing attacks,leading to inefficiencies in resource utilization and suboptimal defense performance.To address these issues and enhance the security and resource utilization of cloud email nodes,this paper proposes a user behavior-based defense resource allocation me-thod.Firstly,a risk assessment model for cloud email nodes is developed,which comprehensively evaluates the success rate of phishing attacks and the cloud risks associated with both individual nodes and multiple interconnected nodes.Next,dynamic defense resource allocation algorithms are designed for both individual nodes and collaborative resource allocation across multiple interlinked nodes.These algorithms adjust resource allocation strategies in real-time based on factors such as user login probabilities,trust relationships,behavior patterns,the available defense resources at each node,and the current threat landscape.Experimental results show that,compared to existing methods,the proposed approach enables collaborative resource allocation,improves utilization,achieves the lowest system loss,and offers a better solution for cloud email node defense resource allocation.

Key words: Cloud email, User behavior, Phishing emails, Defense strategies, Resource allocation

CLC Number: 

  • TP393
[1]RADICATI.GROUP.Email statistics report 2022-2026[R/OL].https://www.radicati.com/wp/wp-content/uploads/2022/11/Email-Statistics-Report-2022-2026-Executive-Summary.pdf.
[2]RAO S,VERMA A K,BHATIA T.A review on social spam detection:Challenges,open is-sues,and future directions[J].Expert Systems with Applications,2021,186:115742.
[3]MACAS M,WU C,FUERTES W.A survey on deep learning for cybersecurity:Progress,challenges,and opportunities[J].Computer Networks,2022,212:109032.
[4]BOUKE M A,ABDULLAH A,ALSHATEBI S H,et al.The intersection of targeted advertising and security:Unraveling the mystery of overheard conversations[J].Telematics and Informatics Reports,2023,11:100092.
[5]ALKARAKI J N,GAWANMEH A,FACHKHA C.Blockchain for email security:A perspective on existing and potential solutions for phishing attacks[C]//2023 Fifth International Confe-rence on Blockchain Computing and Applications(BCCA).IEEE,2023:404-411.
[6]BOUKE M A,ABDULLAH A,UDZIR N I,et al.Overcoming the challenges of data lack,leakage,and dimensionality in intrusion detection systems:a comprehensive review[J].Journal of Communication and Information Systems,2024,39(1):22-34.
[7]WONGWATKIT R,RAKTHAM M,PHAWANANTHAPHUTI T.Intelligent blacklist security system for protecting spammer in corporate email solution:A case of corporate email ser-vice provider in thailand[C]//2022 24th International Confe-rence on Advanced Communication Technology(ICACT).IEEE,2022:387-391.
[8]SURWADE A U.Blocking Phishing e-mail by extracting header information of e-mails[C]//2020 International Conference on Smart Innovations in Design,Environment,Management,Planning and Computing(ICSIDEMPC).IEEE,2020:151-155.
[9]BOUKE M A,ALRAMLI O I,ABDULLAH A.XAIRF-WFP:a novel XAI-based random forest classifier for advanced email spam detection[J].International Journal of Information Security,2025,24(1):5.
[10]LI X,ZHANG D,WU B.Detection method of phishing email based on persuasion principle[C]//2020 IEEE 4th Information Technology,Networking,Electronic and Automation Control Conference(ITNEC).IEEE,2020:571-574.
[11]HEIDING F,SCHNEIER B,VISHWANATH A,et al.Devising and detecting phishing emails using large language models[J].arXiv:2308.12287,2023.
[12]SYMANTEC.Symantec cloud email security[EB/OL].https://docs.broadcom.com/doc/emailsecurity-cloud-2019-11-service-description-en.
[13]XIAO D,JIANG M Y.Malicious Mail Filtering and Tracing System Based on KNN and Improved LSTM Algorithm[C]//2020 IEEE International Symposium on Dependable,Autonomic and Secure Computing(DASC).IEEE,2020:222-229.
[14]WEI W,WANG Q,XU H,et al.Highly complex resource scheduling for stochastic demands in heterogeneous clouds[J].Journal of Grid Computing,2021,19:1-16.
[15]WEI W,WANG Q,YANG W,et al.Efficientstochastic scheduling for highly complex resource placement in edge clouds[J].Journal of Network and Computer Applications,2022,202:103365.
[16]WEI W,LI H,YANG W.Cost-effective stochastic resourceplacement in edge clouds with horizontal and vertical sharing[J].Future Generation Computer Systems,2023,138:213-225.
[17]GILL S S,GARRAGHAN P,STANKOVSKI V,et al.Holistic resource management for sustainable and reliable cloud computing:An innovative solution to global challenge[J].Journal of Systems and Software,2019,155:104-129.
[18]AHLAWAT C,KRISHNAMURTHI R.Q-learning with function Approximator for clustering based Optimal resource Allocation in fog environment[C]//Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing.2022:127-135.
[19]JEONG B,BAEK S,PARK S,et al.Stable and efficient resource management using deep neural network on cloud computing[J].Neurocomputing,2023,521:99-112.
[20]YU B,LI X H,PAN C Y,et al.Edge-cloud collaborative resource allocation algorithm based on deep reinforcement learning[J].Chinese Journal of Computer Science,2022,49(7):248-253.
[21]GAN D,GE X,LI Q.An optimal transport-based federated rein-forcement learning approach for resource allocation in cloud-edge collaborative IoT[J].IEEE Internet of Things Journal,2023,11(2):2407-2419.
[22]NAWROCKI P,SMENDOWSKI M.FinOps-driven optimization of cloud resource usage for high-performance computing using machine learning[J].Journal of Computational Science,2024,79:102292.
[23]NEEMA G,KADAN A B,VIJAYAN V P.Multi-objective load balancing in cloud infrastructure through fuzzy based decision making and genetic algorithm based optimization[J].IAES International Journal of Artificial Intelligence,2023,12(2):678.
[24]YANG Z M,ZUO L L,JI W.Joint optimization method for node deployment and resource allocation based on edge-end collaboration[J].Chinese Journal of Computer Science,2024,51(S2):665-671.
[25]SHAIK M B,REDDY K S,CHOKKANATHAN K,et al.A Hybrid Particle Swarm Optimization and Simulated Annealing with Load Balancing Mechanism for Resource Allocation in Fog-Cloud Environments[J].IEEE Access,2024,12:172439-172450.
[26]SENTHIL KUMAR A M,PADMANABAN K,VELMURU-GAN A K,et al.A novel resource management framework in a cloud computing environment using hybrid cat swarm BAT(HCSBAT) algorithm[J].Distributed and Parallel Databases,2023,41(1):53-63.
[27]NARWAL A.Resource Utilization Based on Hybrid WOA-LOA Optimization with Credit Based Resource Aware Load Balancing and Scheduling Algorithm for Cloud Computing[J].Journal of Grid Computing,2024,22(3):61.
[28]PRECIADO V M,ZARGHAM M,ENYIOHA C,et al.Optimal resource allocation for network protection against spreading processes[J].IEEE Transactions on Control of Network Systems,2014,1(1):99-108.
[29]WANG M,SONG L.Efficient defense strategy against spam and phishing email:An evolutionary game model[J].Journal of Information Security and Applications,2021,61:102947.
[30]OGURA M,PRECIADO V M,MASUDA N.Optimal Con-tainment of Epidemics over Temporal Activity-Driven Networks[J].SIAM Journal on Applied Mathematics,2019:79(3):986-1006.
[31]HAMOUDA E,ELHAFSI M,SON J.Securing Network Resilience:Leveraging Node Centrality for Cyberattack Mitigation and Robustness Enhancement[J].Information Systems Frontiers,2024,26(1):1-16.
[1] HUAN Haisheng, ZHAO Peng, CHEN Nuo, KA Zuming. Review of Offloading Technologies Research in Mobile Edge Computing [J]. Computer Science, 2026, 53(2): 367-378.
[2] LI Fang, YUAN Baochun, SHEN Hang, WANG Tianjing, BAI Guangwei. Deep Reinforcement Learning-based Aircraft Task Offloading in Low Earth Orbit Satellite Networks [J]. Computer Science, 2026, 53(2): 406-415.
[3] ZHANG Minghao, XIAO Bohuai, ZHENG Song, CHEN Xing. Resource Allocation Method with Workload-time Windows for Serverless Applications inCloud-edge Collaborative Environment [J]. Computer Science, 2025, 52(6): 336-345.
[4] PENG Mingtian, WANG Weishuai, TIAN Feng, LI Jiangtao, LU Yan, MA Shuyan, ZHU Honglin, LIU Chi. Personalized Multi-attribute Airline Itinerary Recommendation System by Graph ConvolutionalNeural Network [J]. Computer Science, 2025, 52(11A): 250200088-6.
[5] XU Haiyang, LIU Hailong, YANG Chaoyun, WANG Shuo, LI Zhanhuai. MMOS:Memory Resource Sharing Methods to Support Overselling in Multi-tenant Databases [J]. Computer Science, 2024, 51(2): 27-35.
[6] YANG Zheming, ZUO Lulu, JI Wen. Joint Optimization Method for Node Deployment and Resource Allocation Based on End-EdgeCollaboration [J]. Computer Science, 2024, 51(11A): 240200010-7.
[7] XUE Jianbin, YU Bowen, XU Xiaofeng, DOU Jun. Queueing Theory-based Joint Optimization of Communication and Computing Resources in Edge Computing Networks [J]. Computer Science, 2024, 51(11A): 240100103-9.
[8] XUE Jianbin, TIAN Guiying, MA Yuling, SHAO Fei, WANG Tao. Study on Optimization of Long-distance Relay Communication and Computational Offloading Strategy Based on Self-powered UAVs [J]. Computer Science, 2024, 51(11A): 240300069-7.
[9] LUO Junren, ZOU Mingwo, CHEN Shaofei, ZHANG Wanpeng, CHEN Jing. Research Progress on Colonel Blotto Game Models and Solving Methods [J]. Computer Science, 2024, 51(1): 84-98.
[10] CHEN Yipeng, YANG Zhe, GU Fei, ZHAO Lei. Resource Allocation Strategy Based on Game Theory in Mobile Edge Computing [J]. Computer Science, 2023, 50(2): 32-41.
[11] LI Xiaohuan, CHEN Bitao, KANG Jiawen, YE Jin. Coalition Game-assisted Joint Resource Optimization for Digital Twin-assisted Edge Intelligence [J]. Computer Science, 2023, 50(2): 42-49.
[12] CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85.
[13] YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253.
[14] TANG Feng, FENG Xiang, YU Hui-qun. Multi-task Cooperative Optimization Algorithm Based on Adaptive Knowledge Transfer andResource Allocation [J]. Computer Science, 2022, 49(7): 254-262.
[15] LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!