DETECTING AND BLOCKING OF SPAM ZOMBIE MECHANISM

Abstract

A zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to zombies. These compromised machines send a lot of spam messages on the internet. Such machines result in spamming attacks, DDOS attacks, identity theft which result in different kind of losses to the victim. Spamming botnets is the network of compromised machines involved in spamming. The SPOT, the sequential probability ratio test is used for detecting the compromised machines. SPRT is used since the error rate produced is infinitesimally small and the number of observations required to deciding whether a machine is compromised or not is also small. It helps in observing the outgoing messages from a machine in a network. Out of a large number of machines in a network only a few of them are not compromised. For an instance, out of 440 internal IP addresses SPOT identifies 132 of them as being compromised. This system has been developed for system administrators for monitoring the machines in a network.

Authors and Affiliations

Mankar Aarti , Sardeshpande Sandeep , Shirohiya Mayur , Thigale Shital

Keywords

Related Articles

A Single Image Super Resolution Using Advanced Neighbor Embedding

There are lots of Super resolution methods developed recently. Each has its own pros and cons and behavior. The neighbor-embedding (NE) algorithm for single-image super-resolution reconstruction is one of them which assu...

Intrusion Detection System with Data Stream Modeling using Conditional Privileges

IDS for computer network is capable of detecting and alerting the systems administrator on potential intrusion, providing guidance against any potential loss of integrity and confidentiality to the enterprise’s valuable...

Semiconductor Optical Amplifiers (SOA) Performance Optimization in Optical Communication System

The work has been focused on the XOR, AND, OR logic gate implementation, since it is a very versatile approach for implementing many functions in optical networks. The development and study of a novel architecture based...

A Framework on Adaptive Information System for Mobile User

People are interested in having automatic services as per their frequent requirements in Personal Digital Assistant like mobile phones, tablets etc. Efficient mobile services to the citizens operating urban and rural lif...

Ant Colony Optimization Algorithm Based Vehicle Theft Prediction- revention and Recovery System Model (Aco-Vtp2rsm)

Existing vehicle security technologies are either capable of theft, prevention or recovery or both. They lack the capability to predict theft occurrence and this makes the task of theft prevention or recovery unattainabl...

Download PDF file
  • EP ID EP105633
  • DOI -
  • Views 130
  • Downloads 0

How To Cite

Mankar Aarti, Sardeshpande Sandeep, Shirohiya Mayur, Thigale Shital (2015). DETECTING AND BLOCKING OF SPAM ZOMBIE MECHANISM. International Journal of Computer Science & Engineering Technology, 6(1), 10-11. https://europub.co.uk/articles/-A-105633