International Journal of Innovative Science Engineering and Technology (IJISET)
To examine the traceability on the Internet how actually works. Failures of traceability, with consequent unintentional anonymity, have continued as the technology has been changed. The lack of traceability at the edges is stealing another person's identity on a wide area network that existing tools and procedures would entirely fail to detect. Especially governments see preserving activity logs, as essential for the traceability of illegal cyberspace activity. Present a new and efficient security model of processing email server logs to detect machines sending \"Bulk email\spam\" or \"E-mail infected with viruses\" using IP address based cyberspace tracing.