Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Preventing PC from Spam Zombies Using SPOT and RE-ENCRYPTION Methods


Affiliations
1 Sathyabama University, Chennai, India
2 Meenakshi College of Engineering, Chennai, India
     

   Subscribe/Renew Journal


Spamming is a most important threat which is easily spread across various machines over the network, so it is an easiest way to attackers to employ into larger number of machines without any restrictions. To detect the machines which are attacked by the spamming activities are called Spam Zombies. The Sequential Probability Ratio Test is used to detect false positive error rates and false negative error rates, which is based on the principle of SPOT. The protocol which is used to analyze the security of spam zombies followed by the proxy re-encryption mechanism called Onion Routing Protocol. By identifying the spam zombies the performance of the network admin can be increased by Heuristic Search mechanism.

Keywords

Compromised Machines, Onion Routing Protocol, Spam Zombies, Proxy Re-Encryption, Heuristic Search Mechanism.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 135

PDF Views: 3




  • Preventing PC from Spam Zombies Using SPOT and RE-ENCRYPTION Methods

Abstract Views: 135  |  PDF Views: 3

Authors

G. Sathish Kumar
Sathyabama University, Chennai, India
G. Gunasekaran
Meenakshi College of Engineering, Chennai, India

Abstract


Spamming is a most important threat which is easily spread across various machines over the network, so it is an easiest way to attackers to employ into larger number of machines without any restrictions. To detect the machines which are attacked by the spamming activities are called Spam Zombies. The Sequential Probability Ratio Test is used to detect false positive error rates and false negative error rates, which is based on the principle of SPOT. The protocol which is used to analyze the security of spam zombies followed by the proxy re-encryption mechanism called Onion Routing Protocol. By identifying the spam zombies the performance of the network admin can be increased by Heuristic Search mechanism.

Keywords


Compromised Machines, Onion Routing Protocol, Spam Zombies, Proxy Re-Encryption, Heuristic Search Mechanism.