Cyberspace Tracing: Study and Generation of Security Model for Spam and Bulk Email Prevention

Download Now
Provided by: International Journal of Innovative Science Engineering and Technology (IJISET)
Topic: Security
Format: PDF
To examine the traceability on the Internet how actually works. Failures of traceability, with consequent unintentional anonymity, have continued as the technology has been changed. The lack of traceability at the edges is stealing another person's identity on a wide area network that existing tools and procedures would entirely fail to detect. Especially governments see preserving activity logs, as essential for the traceability of illegal cyberspace activity. Present a new and efficient security model of processing email server logs to detect machines sending \"Bulk email\spam\" or \"E-mail infected with viruses\" using IP address based cyberspace tracing.
Download Now

Find By Topic