Exposure Towards Compromised Machines Concerned in Spam Activity

Download Now
Provided by: International Journal of Reviews on Recent Electronics and Computer Science (IJRRECS)
Topic: Security
Format: PDF
Spamming provides a serious financial motivation for controllers concerning compromised machines to novice these machines which are involved in spamming. Recognizing and cleaning compromised machines in a network persists a vital challenge in support of system administrators concerning networks of the entire sizes. Discovery of compromised machines within a network applied for directing junk messages, which are usually referred to as spam zombies. On the basis of a straightforward statistical tool described sequential probability ratio test an active spam zombie detection system called SPOT was developed to notice compromised machines that are concerned in spamming actions by observing outgoing messages in a network and recognize both the false positive and false negative likelihoods.
Download Now

Find By Topic