Open Access Open Access  Restricted Access Subscription or Fee Access

Preventing PC from Spam Zombies using SPOT and RE-ENCRYPTION Methods

G. Sathish Kumar, Dr. G. Gunasekaran

Abstract


Spamming is a most important threat which is easily spread across various machines over the network, so it is an easiest way to attackers to employ into larger number of machines without any restrictions. To detect the machines which are attacked by the spamming activities are called Spam Zombies. The Sequential Probability Ratio Test is used to detect false positive error rates and false negative error rates, which is based on the principle of SPOT. The protocol which is used to analyze the security of spam zombies followed by the proxy re-encryption mechanism called Onion Routing Protocol. By identifying the spam zombies the performance of the network admin can be increased by Heuristic Search mechanism.

Keywords


Compromised Machines, Onion Routing Protocol, Spam zombies, Proxy Re-encryption, Heuristic Search Mechanism.

Full Text:

PDF

References


Z. Duan, Y. Dong, and K. Gopalan, “DMTP: Controlling Spam through Message Delivery Differentiation,” Computer Networks, vol. 51, pp. 2616-2630, July 2007.

Z.Duan,Y.Dong, and K.Gopalan, “DMTP: Controlling Spam through Message Delivery Differentiation, “Computer Networks, 2007.

C. J. Kowalski, “The OC and ASN Functions of Some SPRT’s for the Correlation Coefficient,” Technometrics, Vol. 13, No. 4, 1971, pp. 833-840. doi:10.1080/00401706.1971.10488853

G. Gu, J. Zhang, and W. Lee, “BotSniffer: Detecting BotnetCommand and Control Channels in Network Traffic,” Proc. 15thAnn. Network and Distributed System Security Symp. (NDSS ’08),Feb. 2008.

Ping Wang Sherri Sparks Cliff C. Zou , ―An Advanced Hybrid Peer-to-Peer Botnet‖, School of Electrical Engineering and Computer Science University of Central Florida, Orlando, FL

Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. In Proceedings of the 12th Annual Network and Distributed System Security Symposium, pages 29–44. Internet Society, February 2005.

Diskey, Jay, on behalf of the Association of American Publishers. “ED-2012-OESE-0003 Testing Integrity Response.” February 16, 2012..

M. G. Reed, P. F. Syverson, and D. M. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4):482-494, May 1998.

Jee Hea An, Yevgeniy Dodis, and Tal Rabin. On the security of joint signature and encryption. In EUROCRYPT ’02: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques,pages 83–107, London, UK, 2002. Springer-Verlag.

P. Golle, M. Jakobsson, A. Juels, and P. F. Syverson. Universal Re-encryption for Mixnets. In Proceedings of CT-RSA '04, volume 2964 of LNCS, pages 163.178,2004

Hart, P. E.; Nilsson, N. J.; Raphael, B. (1968)."A Formal Basis for the Heuristic Determination of Minimum Cost Paths". IEEE Transactions on Systems Science and Cybernetics SSC4 4 (2): 100–107

Digital Communications, John Proakis, Massoud Salehi, McGraw-Hill Education, Nov 6, 2007

Popelka , O.; Rukovansky, I. Optimization of Computer Network with Grammatical Evolution. In proceedings of Fifth international conference on soft computing applied in computer and economic environments ICSC 2007, January 26, EPI Kunovice, pp. 201-205, ISBN 80-7314- 108-6.

Giuseppe Ateniese, Kevin Fu, Matthew Green, Sussan Hohenberger. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage, pages 1-3.

Matthew Green, Giuseppe Ateniese , Identity-Based Proxy Re-Encryption, pages 1-6.

Mihir Bellare1, Viet Tung Hoang. Adaptive Witness Encryption and Asymmetric Password-based Cryptography, pages 1-3.

R. Kishore Kumar, G. Poonkuzhali, P. Sudhakar, Member, IAENG. Comparative Study on Email Spam Classifier using Data Mining Techniques.

Wanli Ma, Dat Tran, and Dharmendra Sharma, A Novel Spam Email Detection System Based on Negative Selection.

Roer Dingledine, Nick Mathewson, Steven Murdoch. Tor: The Second-Generation Onion Router.

Landsiedel, O. ; RWTH Aachen Univ., Aachen ; Pimenidis, A. ; Wehrle, K. ; Niedermayer, Heiko, Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks.

B.Raju, A.Jesudoss and D. Saravanan, Detecting A New Cells Based On Attacks Against TOR Network.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.