2. Compromised machines are one of the key security threats which often
leads to attacks such as spamming,spreading malware , DDos and identity
theft.
These machines which are involved in the spamming activities, called as
spam zombies are detected by using spam zombie detection system named
SPOT.
SPOT is designed based on powerful statistical tool called sequential
probability ratio test (SPRT).
3. In the existing system , compromised machines have been increasingly
used to launch various security attacks.
Better suited for understanding the aggregate global characteristics of
spamming botnets.
Drawbacks:
‣ Online detection requirement in the network is not supported.
‣ Focus on point of infection.
‣ Analyses the rate at which messages are sent.
4. We focus on detection of compromised machines commonly referred as
spam zombies in the network.
We aim to develop a tool for automatically detecting the compromised
machines in an online manner.
Detects compromised machines quickly and accurately, with low false
positive and false negative rates.
Fig: Network Model
5. H/W SYSTEM CONFIGURATION
Processor - Pentium-III
Speed -1.1 GHz
RAM -256 MB(min)
Hard Disk -20 GB
Floppy Drive -1.44 MB
Keyboard - standard windows keyboard
Mouse -Two or three Button Mouse
Monitor -SVGA (super video graphic array)
6. S/W SYSTEM CONFIGURATION
Operating system -windows95/98/2000/XP
Tool - Netbeans
Front end -java , swings, applet
Database (back end) - MySql
Database connectivity –JDBC
9. Java Portability
NETWORKING
TCP is a connection-oriented protocol and reliable.
UDP (User Datagram Protocol) is a connectionless and unreliable
protocol.
10. •Microsoft Open Database Connectivity (ODBC) is a standard
programming interface for application developers and database systems
providers.
•The beauty of ODBC is that the application can be written to use the same
set of function calls to interface with any data source, regardless of the
database vendor.
•In an effort to set an independent database standard API for Java, Sun
Microsystems developed Java Database Connectivity, or JDBC
• The consistent interface is achieved through the use of “plug-in” database
connectivity modules, or drivers.
•If a database vendor wishes to have JDBC support, he or she must provide
the driver for each platform that the database and Java run on.
11. STATIC VIEW OF USERLOGIN TABLE
STATIC VIEW OF MAILDETAILS TABLE
12. Use Case Diagram:
A use case diagram defines the relationship between set of use cases and
actors.
13. +Submit()
-User name
-password
Login
+send()
-Select Client
-Select File
File process
+Submit()
-Optimise file
client
+detect()
-SPOT
-CT
-DT
Spam Detection
+Monitor()
-Error Message
-Percent
Result
Class Diagram:
•Class Diagram are most commonly found diagrams in modeling Object
Oriented System.
• It shows the set of classes , interfaces, their attributes and their
responsibilities.
14. User Login Select Client Select Message Send message SPOT detection CT detection DT detection
Failed
Success Client
send text File
Detection1
detection2
Detection3
Sequence Diagram:
The Sequence Diagram is a model that describes how groups of object.
Collaborate in some behavior over a period of time and capturing the behavior
of single use case.
16. Login
Select Client
Send Message
Select File
CT
DT
Detect
SPOT
Activity Diagram:
It illustrates the dynamic nature of the system by modeling the flow of control
from activity to activity
22. After finishing the development of any computer based system
the next complicated time consuming process is system testing
Software testing is an important element of the software
quality assurance and represents the ultimate review of
specification, design and coding.
Testing Objectives
Testing is a process of validating and verifying that a product:
oMeets the requirements
oWorks as expected
oCan be implemented
oPacifies the needs of customer
A good test case is one that has a high probability of finding an
undiscovered error.
23. Source code testing
Specification testing
Module level testing
Unit testing
Integration testing
Validation testing
Recovery testing
Performance testing
Black box testing
Output testing
Testing Methods
Graphical Analysis in the year 2013
24. The protection of computer based resources that include
hardware, software, data, procedures and people against
unauthorized use or natural disaster is known as system security.
System security can be divided into four related issues:
oSystem security
oData security
oPrivacy
oSystem Integrity
oConfidentiality
25. Based on various test and survey results which are depicted in the
form of tabular columns below it can be concluded that SPOT
outstands other detection algorithms.
It has been an immense pleasure on working on this project which
comes under Network Security domain which is the need of the hour
in this technology driven world.
Example: Recent survey carried out by Florida State University
26. [1] Apache Spam Assassin project. http://spamassassin.apache.org/
[2] DBMS by McGraw-Hill International Edition
[3] F. Sanchez and Z. Duan, ” Understanding forgery properties of spam delivery
paths”, in Proceedings of 7th Annual Collaboration, Electronic Messaging, Anti-Abuse
and Spam Conference (CEAS), Redmond, WA, July 2010.
[4] Java by Cengage Learning
[5]Know your enemy: Tracking Botnets. http://www.honeynet.org/papers/bots.
[6]N. Ianelli and A. Hackworth “Botnets as a Vehicle for Online Crime” in Proc. of
First International Conference on Forensic Computer Science, 2006.
[7] Sequential Methods in Statistics. Chapman and Hall, 1986.
[8] Sequential Analysis. John Wiley & Sons, Inc, 1947
[9] Software Engineering by Precise Approach
[10] Software Testing Modeling by Boris Bezier
[11]UML: OOAD CONCEPTS- Gradybooch