SlideShare ist ein Scribd-Unternehmen logo
1 von 27
BY
KAJOL (10261A0524)
HEMANSHU AGARWAl(10261A0516)
under the guidance of
Mrs.P.Poornima
(assistant Professor)
Cse department
Compromised machines are one of the key security threats which often
leads to attacks such as spamming,spreading malware , DDos and identity
theft.
These machines which are involved in the spamming activities, called as
spam zombies are detected by using spam zombie detection system named
SPOT.
SPOT is designed based on powerful statistical tool called sequential
probability ratio test (SPRT).
 In the existing system , compromised machines have been increasingly
used to launch various security attacks.
 Better suited for understanding the aggregate global characteristics of
spamming botnets.
Drawbacks:
‣ Online detection requirement in the network is not supported.
‣ Focus on point of infection.
‣ Analyses the rate at which messages are sent.
 We focus on detection of compromised machines commonly referred as
spam zombies in the network.
 We aim to develop a tool for automatically detecting the compromised
machines in an online manner.
 Detects compromised machines quickly and accurately, with low false
positive and false negative rates.
Fig: Network Model
 H/W SYSTEM CONFIGURATION
Processor - Pentium-III
Speed -1.1 GHz
RAM -256 MB(min)
Hard Disk -20 GB
Floppy Drive -1.44 MB
Keyboard - standard windows keyboard
Mouse -Two or three Button Mouse
Monitor -SVGA (super video graphic array)
 S/W SYSTEM CONFIGURATION
Operating system -windows95/98/2000/XP
Tool - Netbeans
Front end -java , swings, applet
Database (back end) - MySql
Database connectivity –JDBC
 USER INTERFACE MODULE
 SPAM ZOMBIES DETECTION
 COMPROMISED MACHINE DETECTION ALGORITHM
Java Technology
Java Technology is both a programming language and platform.
Working of Java
Java Portability
NETWORKING
TCP is a connection-oriented protocol and reliable.
UDP (User Datagram Protocol) is a connectionless and unreliable
protocol.
•Microsoft Open Database Connectivity (ODBC) is a standard
programming interface for application developers and database systems
providers.
•The beauty of ODBC is that the application can be written to use the same
set of function calls to interface with any data source, regardless of the
database vendor.
•In an effort to set an independent database standard API for Java, Sun
Microsystems developed Java Database Connectivity, or JDBC
• The consistent interface is achieved through the use of “plug-in” database
connectivity modules, or drivers.
•If a database vendor wishes to have JDBC support, he or she must provide
the driver for each platform that the database and Java run on.
STATIC VIEW OF USERLOGIN TABLE
STATIC VIEW OF MAILDETAILS TABLE
Use Case Diagram:
A use case diagram defines the relationship between set of use cases and
actors.
+Submit()
-User name
-password
Login
+send()
-Select Client
-Select File
File process
+Submit()
-Optimise file
client
+detect()
-SPOT
-CT
-DT
Spam Detection
+Monitor()
-Error Message
-Percent
Result
Class Diagram:
•Class Diagram are most commonly found diagrams in modeling Object
Oriented System.
• It shows the set of classes , interfaces, their attributes and their
responsibilities.
User Login Select Client Select Message Send message SPOT detection CT detection DT detection
Failed
Success Client
send text File
Detection1
detection2
Detection3
Sequence Diagram:
The Sequence Diagram is a model that describes how groups of object.
Collaborate in some behavior over a period of time and capturing the behavior
of single use case.
LOGIN
Send Nessage
Monitorin
g
message
Detection
SPOT CT DT
Component Diagram:
Component diagram shows the components and their dependencies
between the system.
Login
Select Client
Send Message
Select File
CT
DT
Detect
SPOT
Activity Diagram:
It illustrates the dynamic nature of the system by modeling the flow of control
from activity to activity
Login Page
Compose Mail Form
Mail List
Filtration of File
Spot Detection:
No Spam
Spot Detection:
Spam File
Performance Test
CT Detection
PT Detection
 After finishing the development of any computer based system
the next complicated time consuming process is system testing
 Software testing is an important element of the software
quality assurance and represents the ultimate review of
specification, design and coding.
Testing Objectives
Testing is a process of validating and verifying that a product:
oMeets the requirements
oWorks as expected
oCan be implemented
oPacifies the needs of customer
A good test case is one that has a high probability of finding an
undiscovered error.
 Source code testing
 Specification testing
 Module level testing
 Unit testing
 Integration testing
 Validation testing
 Recovery testing
 Performance testing
 Black box testing
 Output testing
Testing Methods
Graphical Analysis in the year 2013
The protection of computer based resources that include
hardware, software, data, procedures and people against
unauthorized use or natural disaster is known as system security.
System security can be divided into four related issues:
oSystem security
oData security
oPrivacy
oSystem Integrity
oConfidentiality
Based on various test and survey results which are depicted in the
form of tabular columns below it can be concluded that SPOT
outstands other detection algorithms.
It has been an immense pleasure on working on this project which
comes under Network Security domain which is the need of the hour
in this technology driven world.
Example: Recent survey carried out by Florida State University
[1] Apache Spam Assassin project. http://spamassassin.apache.org/
[2] DBMS by McGraw-Hill International Edition
[3] F. Sanchez and Z. Duan, ” Understanding forgery properties of spam delivery
paths”, in Proceedings of 7th Annual Collaboration, Electronic Messaging, Anti-Abuse
and Spam Conference (CEAS), Redmond, WA, July 2010.
[4] Java by Cengage Learning
[5]Know your enemy: Tracking Botnets. http://www.honeynet.org/papers/bots.
[6]N. Ianelli and A. Hackworth “Botnets as a Vehicle for Online Crime” in Proc. of
First International Conference on Forensic Computer Science, 2006.
[7] Sequential Methods in Statistics. Chapman and Hall, 1986.
[8] Sequential Analysis. John Wiley & Sons, Inc, 1947
[9] Software Engineering by Precise Approach
[10] Software Testing Modeling by Boris Bezier
[11]UML: OOAD CONCEPTS- Gradybooch
Thank You .

Weitere ähnliche Inhalte

Was ist angesagt?

virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirussandipslides
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirussandipslides
 
Project Report on Intrusion Detection System
Project Report on Intrusion Detection SystemProject Report on Intrusion Detection System
Project Report on Intrusion Detection SystemVishal Polley
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virusmissstevenson01
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention MohammedAlmuhaimeed
 
Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Systweak Software
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3Education
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersPROBOTEK
 
Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...PROBOTEK
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
IRJET- Smart Machine System for Virtually Impaired People
IRJET-  	  Smart Machine System for Virtually Impaired PeopleIRJET-  	  Smart Machine System for Virtually Impaired People
IRJET- Smart Machine System for Virtually Impaired PeopleIRJET Journal
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMDr.Florence Dayana
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 

Was ist angesagt? (20)

virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Project Report on Intrusion Detection System
Project Report on Intrusion Detection SystemProject Report on Intrusion Detection System
Project Report on Intrusion Detection System
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
 
47
4747
47
 
Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability Scanners
 
Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
IRJET- Smart Machine System for Virtually Impaired People
IRJET-  	  Smart Machine System for Virtually Impaired PeopleIRJET-  	  Smart Machine System for Virtually Impaired People
IRJET- Smart Machine System for Virtually Impaired People
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
Gesture recognition1
Gesture recognition1Gesture recognition1
Gesture recognition1
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 

Andere mochten auch

Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social AuthenticationFaces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social AuthenticationFACE
 
Detecting Spam Zombies by Monitoring Outgoing Messages
Detecting  Spam Zombies  by  Monitoring  Outgoing  MessagesDetecting  Spam Zombies  by  Monitoring  Outgoing  Messages
Detecting Spam Zombies by Monitoring Outgoing Messages Gowtham Chandra
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technologyBinu p jayan
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarkajol agarwal
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 

Andere mochten auch (6)

Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social AuthenticationFaces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
 
Detecting Spam Zombies by Monitoring Outgoing Messages
Detecting  Spam Zombies  by  Monitoring  Outgoing  MessagesDetecting  Spam Zombies  by  Monitoring  Outgoing  Messages
Detecting Spam Zombies by Monitoring Outgoing Messages
 
Social Media Fraud Metrics
Social Media Fraud MetricsSocial Media Fraud Metrics
Social Media Fraud Metrics
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminar
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 

Ähnlich wie spamzombieppt

2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEEMEMTECHSTUDENTPROJECTS
 
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...chennaijp
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET Journal
 
Security Application for Malicious Code Detection using Data Mining
Security Application for Malicious Code Detection using Data MiningSecurity Application for Malicious Code Detection using Data Mining
Security Application for Malicious Code Detection using Data MiningPravinYalameli
 
Infrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingInfrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingElanusTechnologies
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...swathi78
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Laura Arrigo
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools usedZoe Gilbert
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...MohamedOmerMusa
 
Enchaning system effiency through process scanning
Enchaning system effiency through process scanningEnchaning system effiency through process scanning
Enchaning system effiency through process scanningsai kiran
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesAmit Kumbhar
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxRineri1
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET Journal
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...swathi78
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 

Ähnlich wie spamzombieppt (20)

2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
 
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
 
Security Application for Malicious Code Detection using Data Mining
Security Application for Malicious Code Detection using Data MiningSecurity Application for Malicious Code Detection using Data Mining
Security Application for Malicious Code Detection using Data Mining
 
Types of Vulnerability Scanning An in depth investigation.pdf
Types of Vulnerability Scanning An in depth investigation.pdfTypes of Vulnerability Scanning An in depth investigation.pdf
Types of Vulnerability Scanning An in depth investigation.pdf
 
Infrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingInfrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration Testing
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
 
Enchaning system effiency through process scanning
Enchaning system effiency through process scanningEnchaning system effiency through process scanning
Enchaning system effiency through process scanning
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows Vulnerabilities
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
 
FALCON.pptx
FALCON.pptxFALCON.pptx
FALCON.pptx
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 

spamzombieppt

  • 1. BY KAJOL (10261A0524) HEMANSHU AGARWAl(10261A0516) under the guidance of Mrs.P.Poornima (assistant Professor) Cse department
  • 2. Compromised machines are one of the key security threats which often leads to attacks such as spamming,spreading malware , DDos and identity theft. These machines which are involved in the spamming activities, called as spam zombies are detected by using spam zombie detection system named SPOT. SPOT is designed based on powerful statistical tool called sequential probability ratio test (SPRT).
  • 3.  In the existing system , compromised machines have been increasingly used to launch various security attacks.  Better suited for understanding the aggregate global characteristics of spamming botnets. Drawbacks: ‣ Online detection requirement in the network is not supported. ‣ Focus on point of infection. ‣ Analyses the rate at which messages are sent.
  • 4.  We focus on detection of compromised machines commonly referred as spam zombies in the network.  We aim to develop a tool for automatically detecting the compromised machines in an online manner.  Detects compromised machines quickly and accurately, with low false positive and false negative rates. Fig: Network Model
  • 5.  H/W SYSTEM CONFIGURATION Processor - Pentium-III Speed -1.1 GHz RAM -256 MB(min) Hard Disk -20 GB Floppy Drive -1.44 MB Keyboard - standard windows keyboard Mouse -Two or three Button Mouse Monitor -SVGA (super video graphic array)
  • 6.  S/W SYSTEM CONFIGURATION Operating system -windows95/98/2000/XP Tool - Netbeans Front end -java , swings, applet Database (back end) - MySql Database connectivity –JDBC
  • 7.  USER INTERFACE MODULE  SPAM ZOMBIES DETECTION  COMPROMISED MACHINE DETECTION ALGORITHM
  • 8. Java Technology Java Technology is both a programming language and platform. Working of Java
  • 9. Java Portability NETWORKING TCP is a connection-oriented protocol and reliable. UDP (User Datagram Protocol) is a connectionless and unreliable protocol.
  • 10. •Microsoft Open Database Connectivity (ODBC) is a standard programming interface for application developers and database systems providers. •The beauty of ODBC is that the application can be written to use the same set of function calls to interface with any data source, regardless of the database vendor. •In an effort to set an independent database standard API for Java, Sun Microsystems developed Java Database Connectivity, or JDBC • The consistent interface is achieved through the use of “plug-in” database connectivity modules, or drivers. •If a database vendor wishes to have JDBC support, he or she must provide the driver for each platform that the database and Java run on.
  • 11. STATIC VIEW OF USERLOGIN TABLE STATIC VIEW OF MAILDETAILS TABLE
  • 12. Use Case Diagram: A use case diagram defines the relationship between set of use cases and actors.
  • 13. +Submit() -User name -password Login +send() -Select Client -Select File File process +Submit() -Optimise file client +detect() -SPOT -CT -DT Spam Detection +Monitor() -Error Message -Percent Result Class Diagram: •Class Diagram are most commonly found diagrams in modeling Object Oriented System. • It shows the set of classes , interfaces, their attributes and their responsibilities.
  • 14. User Login Select Client Select Message Send message SPOT detection CT detection DT detection Failed Success Client send text File Detection1 detection2 Detection3 Sequence Diagram: The Sequence Diagram is a model that describes how groups of object. Collaborate in some behavior over a period of time and capturing the behavior of single use case.
  • 15. LOGIN Send Nessage Monitorin g message Detection SPOT CT DT Component Diagram: Component diagram shows the components and their dependencies between the system.
  • 16. Login Select Client Send Message Select File CT DT Detect SPOT Activity Diagram: It illustrates the dynamic nature of the system by modeling the flow of control from activity to activity
  • 19. Filtration of File Spot Detection: No Spam
  • 22.  After finishing the development of any computer based system the next complicated time consuming process is system testing  Software testing is an important element of the software quality assurance and represents the ultimate review of specification, design and coding. Testing Objectives Testing is a process of validating and verifying that a product: oMeets the requirements oWorks as expected oCan be implemented oPacifies the needs of customer A good test case is one that has a high probability of finding an undiscovered error.
  • 23.  Source code testing  Specification testing  Module level testing  Unit testing  Integration testing  Validation testing  Recovery testing  Performance testing  Black box testing  Output testing Testing Methods Graphical Analysis in the year 2013
  • 24. The protection of computer based resources that include hardware, software, data, procedures and people against unauthorized use or natural disaster is known as system security. System security can be divided into four related issues: oSystem security oData security oPrivacy oSystem Integrity oConfidentiality
  • 25. Based on various test and survey results which are depicted in the form of tabular columns below it can be concluded that SPOT outstands other detection algorithms. It has been an immense pleasure on working on this project which comes under Network Security domain which is the need of the hour in this technology driven world. Example: Recent survey carried out by Florida State University
  • 26. [1] Apache Spam Assassin project. http://spamassassin.apache.org/ [2] DBMS by McGraw-Hill International Edition [3] F. Sanchez and Z. Duan, ” Understanding forgery properties of spam delivery paths”, in Proceedings of 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), Redmond, WA, July 2010. [4] Java by Cengage Learning [5]Know your enemy: Tracking Botnets. http://www.honeynet.org/papers/bots. [6]N. Ianelli and A. Hackworth “Botnets as a Vehicle for Online Crime” in Proc. of First International Conference on Forensic Computer Science, 2006. [7] Sequential Methods in Statistics. Chapman and Hall, 1986. [8] Sequential Analysis. John Wiley & Sons, Inc, 1947 [9] Software Engineering by Precise Approach [10] Software Testing Modeling by Boris Bezier [11]UML: OOAD CONCEPTS- Gradybooch