Spot Protocol Detecting Outgoing Spam Messages

نویسنده

  • Raja Varman
چکیده

compromised machines it is one of the internet key security threats. It is used to identifying the security attacks such as Ddos, spreading malware and spamming threats and identifying networking threats. It is detect the compromised machines that are all involved in networking activities. This type of spamming activities is known as spam zombies. We implementing the effective attacks are detecting spam zombie system that name is spot by monitoring outgoing messages with packages of the network. It is one of the powerful statistical tools that is known as sequential probability ratio test, it must be bounded in false negative and false positive error rates. The spot protocols are used to filtering the without extension file formats and attachment and also compressed files and eliminated those data in the sender part itself. Key Terms: spam zombies detection; compromised machine detecting algorithms; compromised machines

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

NICE : Network Intrusion detection and Counter measure selection in virtual network systems

The area of detecting malicious behavious has been well explored in the following approaches. SPOT focuses on the detection of compromised machines that have been recruited to serve as spam zombies. It is based on sequentially scanning outgoing messages while employing a statistical method Sequential Probability Ratio Test (SPRT), to quickly determine whether a host has been compromised. BotHun...

متن کامل

An Effective Model for SMS Spam Detection Using Content-based Features and Averaged Neural Network

In recent years, there has been considerable interest among people to use short message service (SMS) as one of the essential and straightforward communications services on mobile devices. The increased popularity of this service also increased the number of mobile devices attacks such as SMS spam messages. SMS spam messages constitute a real problem to mobile subscribers; this worries telecomm...

متن کامل

Studying Spamming Botnets Using Botlab

In this paper we present Botlab, a platform that continually monitors and analyzes the behavior of spamoriented botnets. Botlab gathers multiple real-time streams of information about botnets taken from distinct perspectives. By combining and analyzing these streams, Botlab can produce accurate, timely, and comprehensive data about spam botnet behavior. Our prototype system integrates informati...

متن کامل

Throttling Outgoing SPAM for Webmail Services

Spam has become a serious problem of Internet, and the current defense is limited to the filters deployed at the recipient side. Little known research has been applied to reduce the volume of spam messages being generated. In this paper, we present a system that dynamically throttles emails based on the message content at the email server provider (ESP) side. The goal of this system is to reduc...

متن کامل

Analyzing Behavioral Features for Email Classification

Many researchers have applied statistical analysis techniques to email for classification purposes, such as identifying spam messages. Such approaches can be highly effective, however many examine incoming email exclusively — which does not provide detailed information about an individual user’s behavior. Only by analyzing outgoing messages can a user’s behavior be ascertained. Our contribution...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013