International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
Tracking spam mails using SPRT algorithm with AAA Deenashree M P1, Spoorthi A2, Johnpaul C I3 1 B.E, 2
Dept of ISE, NIE, Karnataka, India B.E, Dept of ISE, NIE, Karnataka, India
3Assistant
Professor, Dept of ISE, NIE, Karnataka, India
---------------------------------------------------------------------***--------------------------------------------------------------------remain a significant challenge for system Abstract— A large number of compromised machines which are used to send spam mails have become a threat administrators of network of all sizes. to organizations. There is increase in wastage of Literature Survey network bandwidth due to spamming. This has become a major challenge for administrators to identify and block Based on email messages received at a large the spammers in a network. Attack by Insiders has email service provider, two recent studies investigated resulted in decreased reputation of the organization the aggregate global characteristics of spamming which is the major setback. Hence organizations need a botnets including the size of botnets and the spamming system to validate users and to detect spam mails which patterns of botnets[1]. These studies provided is much needed in the society. important insights into the aggregate global characteristics of spamming botnets by clustering spam Introduction messages received at the provider into spam campaigns The E-mail traffic consists of unsolicited messages using embedded URLs and near-duplicate content called Spam. Email spam, also known as junk email or clustering, respectively. Given that spamming provides unsolicited bulk email, is a subset of a key economic incentive for attackers to recruit the electronic spam involving nearly identical messages large number of compromised machines, we focus on sent to numerous recipients by email. Clicking on links the detection of the compromised machines in a in spam email may send users to phishing web sites or network that are involved in the spamming activities, sites that are hosting malware. Dealing with Spam commonly known as spam zombies[1]. Recent studies incurs high costs for organizations, prompting efforts to show that SPOT is an effective and efficient system in try to reduce spam related costs by installing Spam automatically detecting compromised machines in a Filters. Spamming causes wastage of network network [3]. When we compared spam detection bandwidth. algorithms, the performance of SPOT with two other spam zombie detection algorithms based on the Attacks by Insiders have caused major threat to the number and percentage of spam messages forwarded organizations. So it is a significant challenge for system by internal machines, respectively, it has been observed administrators to identify and block the spammers in a that SPOT outperforms those two detection algorithms network. Spamming provides a key for attackers to [3]. In AAA concept, part of whose mechanism we are recruit the large number of compromised machines. A going to implement in our project, is said to be efficient major security challenge on the internet is the existence for network management and security in a network[2]. of a large number of compromised machine which have In AAA system architecture, a set of security been used to send spam mails and other security mechanisms for real-time secondary market services attacks including spamming and spreading malware, have been proposed. In this architecture[2], the issues distributed denial of service(DDOS) attacks. Identifying of authenticating and authorizing secondary users, and clearing compromised machines in a network synchronizing a group of secondary devices, managing Š 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 1763