SlideShare ist ein Scribd-Unternehmen logo
1 von 41
TABLE OF CONTENT
Abstract
Existing System
Disadvantages
 Proposed System
 Advantages
Modules
Screen shorts
Conclusion
ABSTRACT:
 Compromised machines are one of the key security threats on
the Internet; they are often used to launch various security
attacks such as spamming and spreading malware, and
identity theft.
 we focus on the detection of the compromised machines in a
network that are involved in the spamming activities,
commonly known as spam zombies.
 We develop an effective spam zombie detection system named
SPOT by monitoring outgoing messages of a network.
 SPOT is designed based on a powerful statistical tool called
Sequential Probability Ratio Test, which has bounded false
positive and false negative error rates.
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP.
 Coding Language : JAVA
 DataBase : MYSQL
EXISTING SYSTEM:
 Major security challenge on the Internet is the
existence of the large number of compromised
machines.
 Such machines have been increasingly used to launch
various security attacks including spamming and
spreading malware, and identity theft.
DISADVANTAGES OF EXISTING
SYSTEM:
 They are often used to launch various security attacks
such as spamming and spreading malware, and
identity theft.
 A major security challenge on the Internet is the
existence of the large number of compromised
machines.
PROPOSED SYSTEM:
 In this paper, we focus on the detection of the
compromised machines in a network that are used for
sending spam messages, which are commonly referred to as
spam zombies.
 In proposed system to develop an effective spam zombie
detection system named SPOT.
 SPOT is used to monitoring outgoing messages of a
network.
 SPOT is designed based on a statistical method called
sequential probability ratio test (SPRT).
ADVANTAGES OF PROPOSED SYSEM:
 SPOT is an effective and efficient system in
automatically detecting compromised machines in a
network.
 For example, among the 440 internal IP addresses
observed in the e-mail trace, SPOT identifies 132 of
them as being associated with compromised
machines. Out of the 132 IP addresses identified by
SPOT, 126 can be either independently confirmed (110)
or are highly likely (16) to be compromised.
LIST OF MODULES:
 Account authentication
 Sending mails
 SPOT detection
 capture IP
 SPOT filter
 SPOT results
 CT detection.
 PT detection
Account authentication
 In this module to check the mail id and password.
 If these two fields are valid, the account is
authenticated.
 Otherwise is not valid.
Sending mails
 This module a single person to send one or more mails
to other person.
 This mails either spam or non spam.
 Spam means the more copies of the single message are
send.
 And it contains more than 20 lines.
SPOT detection
 In this module to capture the IP address of the system.
 That system mails are applied to filtering process.
 In this process, the mail content is filtered.
 Finally to produce the result of filter.
CT detection
 In this module to set the threshold value Cs .
 Cs denotes the fixed length of spam mail.
 Also to count the number of lines in each mail.
 If the each mail, counts are greater than equal to
threshold value.
 So, these mails are spam mail.
PT detection
 In this module to set two threshold values.
 1) Ca- specifies the minimum number of mail that
machine must send. 2) P- specifies the maximum
spam mail percentage of a normal machine.
 This algorithm is used to compute the count of total
mails and the count of spam mails of machine.
 To check this count of total mails are greater than
equal to Cs and the count of spam mails are greater
than equal to P.
 If it’s true these mails are spam mail.
Screen Shots :
1.open an account
2. Account authentication :
3. Sending mails
To send mail 20 times in different users.
4. SPOT Detection
5. CT Detection
6. PT Detection
Conclusion:
• In this paper, we developed an effective spam zombie
detection system named SPOT by monitoring outgoing
messages in a network.
• SPOT was designed based on a simple and powerful
statistical tool named Sequential Probability Ratio Test
to detect the compromised machines that are involved
in the spamming activities.
• SPOT has bounded false positive and false negative
error rates.
REFERENCE:
 Zhenhai Duan, Senior Member, IEEE, Peng Chen,
Fernando Sanchez, Yingfei Dong, Member, IEEE, Mary
Stephenson, and James Michael Barker,” Detecting
Spam Zombies by Monitoring Outgoing Messages”,
Queries ?....
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 

Was ist angesagt? (19)

Monitoring the Spread of Active Worms in Internet
Monitoring the Spread of Active Worms in InternetMonitoring the Spread of Active Worms in Internet
Monitoring the Spread of Active Worms in Internet
 
Zero day malware detection
Zero day malware detectionZero day malware detection
Zero day malware detection
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primerChapter 1 malware analysis primer
Chapter 1 malware analysis primer
 
Intrusion detection system based on web usage mining
Intrusion detection system based on web usage miningIntrusion detection system based on web usage mining
Intrusion detection system based on web usage mining
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques
 
47
4747
47
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
4
44
4
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
5
55
5
 
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...
 
Penetration testing overview
Penetration testing overviewPenetration testing overview
Penetration testing overview
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
Antimalware
AntimalwareAntimalware
Antimalware
 

Ähnlich wie Detecting Spam Zombies by Monitoring Outgoing Messages

Auto sign an automatic signature generator for high-speed malware filtering d...
Auto sign an automatic signature generator for high-speed malware filtering d...Auto sign an automatic signature generator for high-speed malware filtering d...
Auto sign an automatic signature generator for high-speed malware filtering d...
UltraUploader
 
Detecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBSDetecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBS
ijsrd.com
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
Karen Oliver
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
UltraUploader
 
An internet worm early warning system
An internet worm early warning systemAn internet worm early warning system
An internet worm early warning system
UltraUploader
 

Ähnlich wie Detecting Spam Zombies by Monitoring Outgoing Messages (20)

Auto sign an automatic signature generator for high-speed malware filtering d...
Auto sign an automatic signature generator for high-speed malware filtering d...Auto sign an automatic signature generator for high-speed malware filtering d...
Auto sign an automatic signature generator for high-speed malware filtering d...
 
OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
 
Tracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAATracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAA
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniques
 
L017317681
L017317681L017317681
L017317681
 
Ananth1
Ananth1Ananth1
Ananth1
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
6
66
6
 
L018118083.new ramya publication (1)
L018118083.new ramya publication (1)L018118083.new ramya publication (1)
L018118083.new ramya publication (1)
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
Detecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBSDetecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBS
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Intrusion Detection System using Hidden Markov Model (HMM)
Intrusion Detection System using Hidden Markov Model (HMM)Intrusion Detection System using Hidden Markov Model (HMM)
Intrusion Detection System using Hidden Markov Model (HMM)
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
Procuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the NetworkProcuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the Network
 
An internet worm early warning system
An internet worm early warning systemAn internet worm early warning system
An internet worm early warning system
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Detecting Spam Zombies by Monitoring Outgoing Messages

  • 1.
  • 2. TABLE OF CONTENT Abstract Existing System Disadvantages  Proposed System  Advantages Modules Screen shorts Conclusion
  • 3. ABSTRACT:  Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as spamming and spreading malware, and identity theft.  we focus on the detection of the compromised machines in a network that are involved in the spamming activities, commonly known as spam zombies.  We develop an effective spam zombie detection system named SPOT by monitoring outgoing messages of a network.  SPOT is designed based on a powerful statistical tool called Sequential Probability Ratio Test, which has bounded false positive and false negative error rates.
  • 4. HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.
  • 5. SOFTWARE REQUIREMENTS:  Operating system : Windows XP.  Coding Language : JAVA  DataBase : MYSQL
  • 6. EXISTING SYSTEM:  Major security challenge on the Internet is the existence of the large number of compromised machines.  Such machines have been increasingly used to launch various security attacks including spamming and spreading malware, and identity theft.
  • 7. DISADVANTAGES OF EXISTING SYSTEM:  They are often used to launch various security attacks such as spamming and spreading malware, and identity theft.  A major security challenge on the Internet is the existence of the large number of compromised machines.
  • 8. PROPOSED SYSTEM:  In this paper, we focus on the detection of the compromised machines in a network that are used for sending spam messages, which are commonly referred to as spam zombies.  In proposed system to develop an effective spam zombie detection system named SPOT.  SPOT is used to monitoring outgoing messages of a network.  SPOT is designed based on a statistical method called sequential probability ratio test (SPRT).
  • 9. ADVANTAGES OF PROPOSED SYSEM:  SPOT is an effective and efficient system in automatically detecting compromised machines in a network.  For example, among the 440 internal IP addresses observed in the e-mail trace, SPOT identifies 132 of them as being associated with compromised machines. Out of the 132 IP addresses identified by SPOT, 126 can be either independently confirmed (110) or are highly likely (16) to be compromised.
  • 10. LIST OF MODULES:  Account authentication  Sending mails  SPOT detection  capture IP  SPOT filter  SPOT results  CT detection.  PT detection
  • 11. Account authentication  In this module to check the mail id and password.  If these two fields are valid, the account is authenticated.  Otherwise is not valid.
  • 12. Sending mails  This module a single person to send one or more mails to other person.  This mails either spam or non spam.  Spam means the more copies of the single message are send.  And it contains more than 20 lines.
  • 13. SPOT detection  In this module to capture the IP address of the system.  That system mails are applied to filtering process.  In this process, the mail content is filtered.  Finally to produce the result of filter.
  • 14. CT detection  In this module to set the threshold value Cs .  Cs denotes the fixed length of spam mail.  Also to count the number of lines in each mail.  If the each mail, counts are greater than equal to threshold value.  So, these mails are spam mail.
  • 15. PT detection  In this module to set two threshold values.  1) Ca- specifies the minimum number of mail that machine must send. 2) P- specifies the maximum spam mail percentage of a normal machine.  This algorithm is used to compute the count of total mails and the count of spam mails of machine.  To check this count of total mails are greater than equal to Cs and the count of spam mails are greater than equal to P.  If it’s true these mails are spam mail.
  • 16. Screen Shots : 1.open an account
  • 18.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. To send mail 20 times in different users.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 32.
  • 33.
  • 35.
  • 36.
  • 37.
  • 38. Conclusion: • In this paper, we developed an effective spam zombie detection system named SPOT by monitoring outgoing messages in a network. • SPOT was designed based on a simple and powerful statistical tool named Sequential Probability Ratio Test to detect the compromised machines that are involved in the spamming activities. • SPOT has bounded false positive and false negative error rates.
  • 39. REFERENCE:  Zhenhai Duan, Senior Member, IEEE, Peng Chen, Fernando Sanchez, Yingfei Dong, Member, IEEE, Mary Stephenson, and James Michael Barker,” Detecting Spam Zombies by Monitoring Outgoing Messages”,