2009 Fourth International Conference on Computer Sciences and Convergence Information Technology 2009
DOI: 10.1109/iccit.2009.128
|View full text |Cite
|
Sign up to set email alerts
|

Fast Effective Botnet Spam Detection

Abstract: Spam mails distributed from botnets have been one of the critical problems for the Internet. Spamming is growing at a rapid rate since sending a flood of mails is easy and very cheap. Spam mails waste user time and consume resources e.g., space and network bandwidth, so fighting against spam is an interesting issue in computer security. We have spent for more than 3 years collecting and analyzing over 161,230 emails from several mailboxes. We found that some users received up to 235 emails per day, only 1 to 3… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…For spam-based botnets, Reference [190] proposes a method for the detection from spam mails received by those botnets. By looking at the mail header, the detection mechanism determines if the mail came from a botnet by looking at the sender's IP, the country of the domain name and the MX host of the sender.…”
Section: Botnet Application Sandboxingmentioning
confidence: 99%
“…For spam-based botnets, Reference [190] proposes a method for the detection from spam mails received by those botnets. By looking at the mail header, the detection mechanism determines if the mail came from a botnet by looking at the sender's IP, the country of the domain name and the MX host of the sender.…”
Section: Botnet Application Sandboxingmentioning
confidence: 99%
“…It effectively works for both types of spam mails namely, 'Text based spam' as well as 'Image based spam'. It locates the sender's IP address, sender's email address; MX records and MX hosts, and analyses all the recorded information to provide effective results [7].…”
Section: Related Workmentioning
confidence: 99%
“…About 8 years ago, spam was sent by spammer's own e-mail servers. Approximately 45% -60% of spam is now sent from compromised systems distributed over the Internet [5][6][7][8]. Spam relaying increases the distribution base and at the same time eludes and overwhelms spam detection systems [9].…”
Section: Introductionmentioning
confidence: 99%