Open Access Open Access  Restricted Access Subscription or Fee Access

Finest Source-Based Refinery of Spam in Networks

M. Manoj

Abstract


The Proposed spam detection project   identifies and eliminates unwanted messages by monitoring outgoing messages. The spam and zombies detection is the main challenging task in the network. In the existing system spam detection has implemented after the data received. According to the user rule and request the current system identifies the spam and zombies by monitoring every outgoing message from the sender. The SPIT technique has going to apply in the proposed project.

Keywords


SPIT, ACL, DDOS, DF, BLACK LIST, WHITELIST

Full Text:

PDF

References


Reuters, “The cost of ‘code red’: $1.2 billion,” USA Today, Aug. 2001, http://usatoday.com/tech/news/2001-08-01-code-red-costs.htm.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, “Inside the slammer worm,” IEEE Security & Privacy Magazine, vol. 1, pp. 33–39, July-Aug. 2003.

D. Moore, C. Shannon, and K. Claffy, “Code-red: a case study on the spread and victims of an internet worm,” in Proc. of ACM SIGCOMM Workshop on Internet measurement, Marseille, France, 2002, pp. 273– 284.

Cisco, “Network security features on the Cisco integrated services routers,” data sheet, 2005, http://www.cisco.com/application/pdf/en/us/guest/products/ps5854/ c1650/cdccont 0900aecd80169b0a.pdf.

G. R. Cantieni, G. Iannaccone, C. Barakat, C. Diot, and P. Thiran, “Reformulating the monitor placement problem: Optimal network-wide sampling,” February 2005. [Online]. Available: citeseer.ist.psu.edu/753975.html

K. Suh, Y. Guo, J. Kurose, and D. Towsley, “Locating network monitors: complexity, heuristics, and coverage,” in Proc. of 24th IEEE Infocom, Miami, FL, USA, March 2005.

M. Kodialam and T. V. Lakshman, “Detecting network intrusions via sampling: A game theoretic approach,” in Proc. of 22nd IEEE Infocom, vol. 3, San Fransisco, CA, USA, April 2003, pp. 1880–1889.

K. Luther, R. Bye, T. Alpcan, A. M¨uller, and S¸ . Albayrak, “A cooperative AIS framework for intrusion detection,” in Proc. of IEEE Int. Conf. on Communications (ICC-2007), Glasgow, Scotland, June 2007.

U. Brandes, “A faster algorithm for betweenness centrality,” Journal of Mathematical Sociology, vol. 25, no. 2, pp. 163–177, 2001.

“Understanding ACL on Catalyst 6500 series switches,” Cisco Systems, San Jose, CA, 2003 [Online]. Available: http://www.cisco.com/en/US/products/hw/switches/s708/products_white_paper09186a00800c9470.shtml

“Protecting your core: Infrastructure protection access control lists,” Cisco Systems, San Jose, CA, 2008 [Online]. Available: http://www.cisco.com/en/US/tech/tk648/k361/technologies_white_paper09186a00801a1a55.shtml


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.