An Efficient Methodology for Detecting Spam Using Spot System
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 1)Publication Date: 2014-01-30
Authors : SARANYA.S R.BHARATHI;
Page : 106-110
Keywords : Compromised machines; spam zombies; spam detection techniques; spot detection system;
Abstract
Major Security challenge on the Internet is the existence of the large number of compromised machines. Compromised machines on the Internet are generally referred to as bots, and the set of bots controlled by a single entity is called a botnet. Botnets have multiple nefarious uses: mounting Distributed denial of service attacks, stealing user passwords and identities, generating click fraud, and sending spam email. Compromised machines are one of the key security threats on the Internet. Given that spamming provides a key economic motivation for attackers to recruiting the large number of compromised machines, and focus on the detection of the compromised machines in a network that are involved in the spamming activities, commonly known as spam zombies. Develop an effective spam zombie detection system named SPOT by monitoring outgoing messages of a network. SPOT is designed based on a powerful statistical tool called Sequential Probability Ratio Test, which has bounded false positive and false negative error rates. The number and the percentage of spam messages originate by spam detection technique.
Other Latest Articles
- Analysis of financial state by neural networks
- Equipment's technological flexibility influence on processing of parts
- Features presentation and evaluation of concepts in problems of cognitive modeling
- Models of the behavior of production-economic system to ensure the reliability of its operation
- The modeling concept of the stability of a viable socio-economic system
Last modified: 2014-01-10 18:27:12