DETECTING AND BLOCKING OF SPAM ZOMBIE MECHANISM
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 1
Abstract
A zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to zombies. These compromised machines send a lot of spam messages on the internet. Such machines result in spamming attacks, DDOS attacks, identity theft which result in different kind of losses to the victim. Spamming botnets is the network of compromised machines involved in spamming. The SPOT, the sequential probability ratio test is used for detecting the compromised machines. SPRT is used since the error rate produced is infinitesimally small and the number of observations required to deciding whether a machine is compromised or not is also small. It helps in observing the outgoing messages from a machine in a network. Out of a large number of machines in a network only a few of them are not compromised. For an instance, out of 440 internal IP addresses SPOT identifies 132 of them as being compromised. This system has been developed for system administrators for monitoring the machines in a network.
Authors and Affiliations
Mankar Aarti , Sardeshpande Sandeep , Shirohiya Mayur , Thigale Shital
A Dymamic Service Composition on Social Networks
In today’s world, web services are highly essential as they are required for accomplishing tasks in a matter of second. Web services provide features such as e-Booking, e-Shopping, e-Banking that helps users to acquire e...
An Overview on the Architecture of WhatsApp
WhatsApp Messenger Application is a messaging application that uses the Internet to connect to the person whose number is registered with WhatsApp Account. Various Databases have been used in the distributed applications...
A NON-LINEAR SCHEME FOR PMEPR REDUCTION IN MC-CDMA SYSTEM
The main feature of the next-generation wireless systems will be the convergence of multimedia services such as speech, audio, video, image, and data. This implies that a future wireless terminal, by guaranteeing high sp...
MODIFIED AODV TO ELIMINATE THE EFFECTS OF BLACK HOLE NODE IN MANET
Mobile Adhoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MA...
Techniques of Software Fault Tolerance
Fault tolerance is the ability of a system to perform its function correctly even in the presence of internal faults. We should accept that, relying on software techniques for obtaining dependability means accepting some...