The Structure of an Instant Messenger Network and its Vulnerability to Malicious Codes

The use of Instant Messengers (IM) has dramatically increased over the past few years. An IM network can be viewed as a graph, in which the nodes are the systems running IM and a link exists between two nodes if they are on each other’s buddy list. Based on the trace collected at the William and Mary gateway, we observe that an IM network has a high degree… CONTINUE READING