2012
DOI: 10.1109/tdsc.2011.49
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Spam Zombies by Monitoring Outgoing Messages

Abstract: Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In this thesis we address this issue by investigating effective solutions to automatically identify compromised machines in a network. Given that spamming provides a key economic incentive for attackers to recruit the large number of compromised machines, we focus on the subset of compromised machines that are involved in the spamming activ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…It is based on a powerful statistic tool Sequential Probability Ratio Test (SPRT). This SPOT approach depend upon two important terminologies count threshold and percentage threshold to detect the malicious spam message from internal machine [18].…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…It is based on a powerful statistic tool Sequential Probability Ratio Test (SPRT). This SPOT approach depend upon two important terminologies count threshold and percentage threshold to detect the malicious spam message from internal machine [18].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Lack of awareness of employee and its users about system in IT industry continues to be nightmare for cloud computing. This loop holes can be exploit by attackers to plan zombie attack [18,25] and phishing attack [21]. Reasons for the existence of these vulnerabilities are poor hiring strategy& background check up, lack of employee screening & security education impartment [10,33].…”
Section: Employee and Cloud User Unawarenessmentioning
confidence: 99%
See 1 more Smart Citation
“…Many diverse schemes for botnet detection have been proposed, such as honeypot or honeynet for capture and analysis [14], correlation analysis of malicious behaviors [15], detection approaches for different C&C mechanisms (e.g. IRC, HTTP, DNS, or P2P) [16][17][18][19], and identifying bots from DDoS and spam [20,21]. However, these techniques mainly focus on the network traffic and obtain evidences of botnet activities indirectly.…”
Section: Related Workmentioning
confidence: 99%
“…About 8 years ago, spam was sent by spammer's own e-mail servers. Approximately 45% -60% of spam is now sent from compromised systems distributed over the Internet [5][6][7][8]. Spam relaying increases the distribution base and at the same time eludes and overwhelms spam detection systems [9].…”
Section: Introductionmentioning
confidence: 99%