Spot- Zombie Filtering System

Authors

  • Rajagopal A karnika(h) karuvambrum(p.o) malappuram(dis) manjeri-3 pin-676123 kerala
  • Geethanjali B
  • Arulprakash P

Keywords:

SPOT, filters, algorithm

Abstract

A major security challenge on the Internet is the existence of the large number of compromised machines. Such machines have been increasingly used to launch various security attacks including spamming and spreading malware, DDoS, and identity theft. These compromised machines are called “Zombies”. In general E-mail applications and providers uses spam filters to filter the spam messages. Spam filtering is a technique for discriminating the genuine message from the spam messages. The attackers send the spam messages to the targeted machine by exalting the filters, which causes the increase in false positives and false negatives. We develop an effective spam zombie detection system named SPOT by monitoring outgoing messages of a network. SPOT focuses on the number of outgoing messages that are originated or forwarded by each computer on a network to identify the presence of Zombies. SPOT is designed based on a powerful statistical tool called Sequential Probability Ratio Test, which has bounded false positive and false negative error rates.

References

Z. Duan, Y. Dong, “Detecting Spam Zombies by monitoring out going Messages”

A. Wald, Sequential Analysis. John Wiley & Sons, 1947.

G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, “BotHunter: Detecting Malware Infection through IdsDriven Dialog Correlation,” Proc. 16th USENIX Security Symp., Aug. 2007.

G. Gu, J. Zhang, and W. Lee, “BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic,” Proc.15th Ann. Network and Distributed System Security Symp. (NDSS ’08),Feb. 2008.

Y. Xie, F. Xu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov, “Spamming Botnets: Signatures and Characteristics,” Proc. ACM SIGCOMM, Aug. 2008.

Botnet Detection by Monitoring Group Activities in DNS Traffic Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon KimKorea University.

M. Xie, H. Yin, and H. Wang, “An effective defense against email spam laundering,” in ACM Conference on Computer and Communication Security, Alexandria, VA, October 30 - November 3 2006.

Downloads

Published

2014-01-30

How to Cite

Rajagopal, A., Geethanjali, B., & P, A. (2014). Spot- Zombie Filtering System. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(01), 503–506. Retrieved from https://ijact.in/index.php/j/article/view/90

Issue

Section

Review Article

Categories

Similar Articles

<< < 2 3 4 5 6 7 8 9 10 11 > >> 

You may also start an advanced similarity search for this article.