ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 4)

Publication Date:

Authors : ;

Page : 205-207

Keywords : spam zombies detection; compromised machine detecting algorithms; compromised machines;

Source : Downloadexternal Find it from : Google Scholarexternal


compromised machines it is one of the internet key security threats. It is used to identifying the security attacks such as Ddos, spreading malware and spamming threats and identifying networking threats. It is detect the compromised machines that are all involved in networking activities. This type of spamming activities is known as spam zombies. We implementing the effective attacks are detecting spam zombie system that name is spot by monitoring outgoing messages with packages of the network. It is one of the powerful statistical tools that is known as sequential probability ratio test, it must be bounded in false negative and false positive error rates. The spot protocols are used to filtering the without extension file formats and attachment and also compressed files and eliminated those data in the sender part itself.

Last modified: 2013-05-02 15:35:07