SPOT PROTOCOL DETECTING OUTGOING SPAM MESSAGES
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 4)Publication Date: 2013-04-15
Authors : Ansari.R V.N Raja Varman;
Page : 205-207
Keywords : spam zombies detection; compromised machine detecting algorithms; compromised machines;
Abstract
compromised machines it is one of the internet key security threats. It is used to identifying the security attacks such as Ddos, spreading malware and spamming threats and identifying networking threats. It is detect the compromised machines that are all involved in networking activities. This type of spamming activities is known as spam zombies. We implementing the effective attacks are detecting spam zombie system that name is spot by monitoring outgoing messages with packages of the network. It is one of the powerful statistical tools that is known as sequential probability ratio test, it must be bounded in false negative and false positive error rates. The spot protocols are used to filtering the without extension file formats and attachment and also compressed files and eliminated those data in the sender part itself.
Other Latest Articles
- AN ADAPTIVE PARTITIONAL CLUSTERING METHOD FOR CATEGORICAL ATTRIBUTE USING K-MEDOID?
- Sharing File System for Campus Wide-Workgroups?
- DYNAMIC DATA GATHERING PROTOCOL IN WIRELESS SENSOR NETWORKS?
- Enhancing Interaction between Smartphones and Web Services on Cloud for Improved Bandwidth and Latency?
- Comparative Analysis and Implementation of Image Encryption Algorithms?
Last modified: 2013-05-02 15:35:07