DETECTING AND BLOCKING OF SPAM ZOMBIE MECHANISM
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 1
Abstract
A zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to zombies. These compromised machines send a lot of spam messages on the internet. Such machines result in spamming attacks, DDOS attacks, identity theft which result in different kind of losses to the victim. Spamming botnets is the network of compromised machines involved in spamming. The SPOT, the sequential probability ratio test is used for detecting the compromised machines. SPRT is used since the error rate produced is infinitesimally small and the number of observations required to deciding whether a machine is compromised or not is also small. It helps in observing the outgoing messages from a machine in a network. Out of a large number of machines in a network only a few of them are not compromised. For an instance, out of 440 internal IP addresses SPOT identifies 132 of them as being compromised. This system has been developed for system administrators for monitoring the machines in a network.
Authors and Affiliations
Mankar Aarti , Sardeshpande Sandeep , Shirohiya Mayur , Thigale Shital
Various Aspects of Minutia As a Fingerprint Feature
Biometrics is one of the biggest tendencies in human identification. The fingerprint is the most widely used biometric. Extracting minutiae from fingerprint images is one of the most important steps in automatic fingerpr...
Simulation of Gray Hole Attack in Adhoc Network Using NS2
A Wireless ad-hoc network is a short-lived network set up by wireless mobile computers or nodes moving randomly in the places that have no network infrastructure. While the nodes communicate with each other, they assist...
A Review on Routing Protocols in Wireless Sensor Network
In wireless sensor network, Routing is the process by which the data gathered by sensors is relayed towards the end user (usually termed as sink).A lot of routing protocols have been developed since now and these protoco...
PATIENT HEALTH MONITORING SYSTEM (PHMS) USING IoT DEVICES
Internet of Things (IoT) is the emerging paradigm, which contains huge amount of smart object and smart devices connected to the internet for communicating with each other. IoT devices are used in many fields which make...
Robust Face Recognition Using Artificial Neural Network
Face recognition is done naturally by humans. However, developing a computer algorithm to do the same thing is difficult. Assume for the moment we start with images, and we want to distinguish between images of different...