detecting and blocking of spam zombie mechanism

Mankar Aarti,,Sardeshpande Sandeep,,Shirohiya Mayur,,Thigale Shital

Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

ISSN: 2320-7248          Impact Factor:1.8         Volume:2         Issue:1         Year: 09 April,2015         Pages:132-134

International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

Abstract

A zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to zombies. These compromised machines send a lot of spam messages on the internet. Such machines result in spamming attacks, DDOS attacks, identity theft which result in different kind of losses to the victim. Spamming botnets is the network of compromised machines involved in spamming. The SPOT, the sequential probability ratio test is used for detecting the compromised machines. SPRT is used since the error rate produced is infinitesimally small and the number of observations required to deciding whether a machine is compromised or not is also small. It helps in observing the outgoing messages from a machine in a network. Out of a large number of machines in a network only a few of them are not compromised. For an instance, out of 440 internal IP addresses SPOT identifies 132 of them as being compromised. This system has been developed for system administrators for monitoring the machines in a network.

Kewords

Internet, Network,Hacking

Reference

[1].Guofei Gu,Junjie Zhang, and Wenke Lee “BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.” [2].Ahmed Khorsi “An Overview of Content-Based Spam Filtering Techniques.” [3].Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy “Spamming Botnets: Signatures and Characteristics.”