Abstract

The Internet is a global system of interconnected computer networks that provides the communication to serve billions of users worldwide. Compromised machines in the internet allows the attackers to launch various security attacks such as DDoS, spamming, and identity theft. Compromised machines are the one of the major security threat on the internet. In this paper we address this issue by using Naïve-Bayesian and SPRT to automatically identify compromised machines in a network. Spamming allows the attackers to recruit the large number of compromised machines to generate the SPAM messages by hiding the identity, these compromised machines commonly known as spam zombies. We used Naïve-Bayesian and manual methods to detect the SPAM messages and used SPRT technique to identify the spam zombies from the SPAM messages. We proved that the Naïve-Bayesian approach minimizes the error rate, false positives and false negatives compared to the manual approach in the process of detecting SPAM message. Our evaluation studies based on one day email trace collected in our organization network that shows Naïve-Bayesian and SPRT are the effective and efficient systems in automatically detecting SPAM messages and compromised machines in a network.

Highlights

  • In today’s computing world, internet plays an important role in our daily lives.It is the place where we do lot of things just sitting at one place

  • First every message is send through the spam filter to categorize the message as spam messages (SPAM) or HAM, the results were passed to the sequential probability ratio test (SPRT) algorithm for zombie detection

  • In this paper we proposed naïve-bayesian approach to detect the SPAM messages in the internet and we extended our research to detect the source of the SPAM

Read more

Summary

Introduction

In today’s computing world, internet plays an important role in our daily lives (in almost every aspect).It is the place where we do lot of things just sitting at one place. Internet influences the people to do positive works and influences the people to trouble others by posing many attacks. These attacks are posed by the attackers directly or indirectly. Most of the successful attacks are from the automated generated code injected by the attackers. These are very dangerous which includes Denial of Service (DoS), Distributed denial of Service (DDoS)[18], E-mail Worms, Viruses, Worms, Trojan horses, phishing attacks etc

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.