DETECTING AND BLOCKING OF SPAM ZOMBIE MECHANISM
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 1
Abstract
A zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to zombies. These compromised machines send a lot of spam messages on the internet. Such machines result in spamming attacks, DDOS attacks, identity theft which result in different kind of losses to the victim. Spamming botnets is the network of compromised machines involved in spamming. The SPOT, the sequential probability ratio test is used for detecting the compromised machines. SPRT is used since the error rate produced is infinitesimally small and the number of observations required to deciding whether a machine is compromised or not is also small. It helps in observing the outgoing messages from a machine in a network. Out of a large number of machines in a network only a few of them are not compromised. For an instance, out of 440 internal IP addresses SPOT identifies 132 of them as being compromised. This system has been developed for system administrators for monitoring the machines in a network.
Authors and Affiliations
Mankar Aarti , Sardeshpande Sandeep , Shirohiya Mayur , Thigale Shital
Rules Reduction Using Decision Matrix
The rules are the prescribed standards on the basis of which decisions are made for specific purpose. The rule is a statement that establishes a principle or standard, and serves as a norm for guiding or mandating action...
Development of a Speech Recognition System for Speaker Independent Isolated Malayalam Words
In this paper, a speech recognition system is developed for recognizing speaker-independent, isolated words. Speech recognition is a fascinating application of Digital Signal Processing and is a pattern classification ta...
ANALYSIS OF LAND SURFACE TEMPERTURE AND PREDICTING THE UNKNOWN VALUES USING SPATIAL INTERPOLATION METHODS
This paper compares five spatial interpolation methods of Kriging-exponential, Krigingspherical,Kriging- Gaussian with different weighting values are unity and 1/Standard Deviation in temperature interpolation,utilizing...
Compact Wide Band Microstrip Line Feed Microstrip Patch Antenna for Wireless Application
This paper presents the increase in bandwidth of a Microstrip Antenna using a simple slotted structure fed by Microstrip line. The main aim of proposed work is to obtain a large bandwidth antenna with reduced size. The p...
A Study on Reliable Data Delivery for Highly Dynamic MANETs
This paper addresses the problem of delivering data packets in highly dynamic Mobile Ad Hoc network. Existing routing protocols are susceptible to node mobility. To overcome this issue, an efficient Position based Routin...