Recognizing Spam Zombies by Monitoring leaving Messages

Download Now
Provided by: International Journal Of Engineering And Computer Science
Topic: Security
Format: PDF
Compromised machines are one of the input security threats on the Internet; they are frequently used to launch various security attacks such as spamming and spreading malware, DDoS, and identity theft. Given that spamming provides a key economic incentive for attackers to recruit the large number of compromised machines, the authors focus on the detection of the compromised machines in a network that are involved in the spamming activities, commonly known as spam zombies. They develop an effective spam zombie detection system named SPOT by monitoring outgoing messages of a network.
Download Now

Find By Topic