SPOT PROTOCOL DETECTING OUTGOING SPAM MESSAGESJournal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 4)
Publication Date: 2013-04-15
Authors : Ansari.R V.N Raja Varman;
Page : 205-207
Keywords : spam zombies detection; compromised machine detecting algorithms; compromised machines;
compromised machines it is one of the internet key security threats. It is used to identifying the security attacks such as Ddos, spreading malware and spamming threats and identifying networking threats. It is detect the compromised machines that are all involved in networking activities. This type of spamming activities is known as spam zombies. We implementing the effective attacks are detecting spam zombie system that name is spot by monitoring outgoing messages with packages of the network. It is one of the powerful statistical tools that is known as sequential probability ratio test, it must be bounded in false negative and false positive error rates. The spot protocols are used to filtering the without extension file formats and attachment and also compressed files and eliminated those data in the sender part itself.
Other Latest Articles
Last modified: 2013-05-02 15:35:07