Ieee Infocom 2009 2009
DOI: 10.1109/infcom.2009.5062096
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Spam Zombies by Monitoring Outgoing Messages

Abstract: Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In this thesis we address this issue by investigating effective solutions to automatically identify compromised machines in a network. Given that spamming provides a key economic incentive for attackers to recruit the large number of compromised machines, we focus on the subset of compromised machines that are involved in the spamming activ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 7 publications
0
16
0
Order By: Relevance
“…The work by Duan [3] clarifies another strategy called SPOT that is gotten from an effective numerical factual instrument called SPRT. It gives a viable spam zombie recognition framework by analyzing active messages from a system.…”
Section: IImentioning
confidence: 99%
“…The work by Duan [3] clarifies another strategy called SPOT that is gotten from an effective numerical factual instrument called SPRT. It gives a viable spam zombie recognition framework by analyzing active messages from a system.…”
Section: IImentioning
confidence: 99%
“…SPOT system developed by Duan et al detects compromised machine by sequentially scanning outgoing messages. SPOT use sequential probability ratio test (SPRT) [4], it minimizes the expected number of observation to reach decision. SPRT is a statistical method; both the false positive and false negative probabilities can be bounded by user defined threshold.…”
Section: Related Workmentioning
confidence: 99%
“…Accordingly, the resulting value of the statistical analysis operation is sent to the VS by the RMTA in the sender's domain. In our study, an effective spam zombie detection system named SPOT [27] is employed for the user rating. The SO that rates the mail users with the returning feedback information may resort to informing these users by blocking the hijacked or maliciously used accounts.…”
Section: Message Id Ip Address Of Authorized Last Validity Time Questmentioning
confidence: 99%