SlideShare a Scribd company logo
1 of 4
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 2, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 189
Detecting Spambot as an Antispam Technique for Web Internet BBS
1
Juned M Laliwala 2
Girish Khilari
1
Gujarat Technological University PG School, Ahmedabad, Gujarat
2
MS (Software Systems),BITS Pilani
Abstract— Spam which is one of the most popular and also
the most relevant topic that needs to be understood in the
current scenario. Everyone whether it may be a small child
or an old person are using emails everyday all around the
world. The scenario which we are seeing is that almost no
one is aware or in simple sentence they do not know what
actually the spam is and what they will do in their systems.
Spam in general means unsolicited or unwanted mails.
Botnets are considered one of the main source of the spam.
Botnet means the group of software’s called bots and the
function of these bots is to run on several compromised
computers autonomously and automatically. The main
objective of this paper is to detect such a bot or spambots for
the Bulletin Board System (BBS). BBS is a computer that is
running software that allows users to leave a message and
access information of general interest. Originally BBSes
were accessed only over a phone line using a modem, but
nowadays some BBSes allowed access via a Telnet, packet
switched network, or packet radio connection. The main
methodology that we are going to focus is on Behavioural-
based Spam Detection (BSD) method. Behavioral-based
Spam Detector (BSD) combines several behaviours of the
spam bots at different stages including the behaviour of
spam preparation before the spam session when the
spammers search for an open relay SMTP service to send e-
mails through, and the behaviour of spammers while
connecting to the mail server. Detecting the abnormal
behaviour produced by the spam activities gives a high rate
of suspicion on the existence of bots.
Keywords— SPAM, Botnet detection, Network threat
detection, Network worm detection.
I. INTRODUCTION
There are several challenges facing the e-mail systems; for
example, the increase of harmful techniques has forced e-
mail users to search for the higher degree of safety and
privacy to ensure the security of the transmitted information
[1]. This is due to the recent spread of viruses, hackers,
malwares, worms, and Botnets.
Spam is one of these challenges that abuse the
electronic messaging system by sending a huge amount of
unrequested bulk messages randomly that makes up of 80%
of the emails as a spam [2]. The reason behind this high
percentage is due to the armies of the harmful bots that are
controlled by a bot master. Botnets refer to a group of
software called „bots‟ or „robots‟. The function of these
bots is to run on several computers autonomously and
automatically [3]. This kind of software usually `works at
the end-user system that has been infected. Once these bots
are installed, they send an identification message to the bot
master.
Fig1. Botnet Architecture
The bot master can start any command and control session
by using these infected computers that are called „zombies‟.
The bot master performs illegal attacks on all these zombies.
Bots work under the shadow to avoid being detected by an
antivirus or observed by the user. Bots software has the
ability to disable the antivirus effect by producing an anti-
antivirus [2]. The best time for the bots to start performing
their activities is during the idle period of the host computer.
This happens especially when the bots sense the low CPU
utilization; hence they start to take advantage of the infected
host resources to do their desired activities.
As the Internet becomes more and more popular,
the Internet becomes not only sources of providing
information, but also channels of effective communication.
Since the Internet may cause severe effects to their society
[1], most of political organizations and media companies
keep monitoring information posted on popular websites.
Web sites like CNN or Facebook, which have millions of
daily visits, provide service spaces for communication. Most
of people regard such a space as a powerful way to
communicate with others, but spammers think this space as
a powerful way to advertise their contents in an illegal
manner. Advertisements by spammers exist especially on
BBS (Bulletin Board System) in major media web sites (like
CNN and The Times) or YouTube comment pages. So
developing a BBS anti-spam module for public websites is
no option for website builders. So many kinds of spam-bots
on BBS were invented and used to generate spams by
attackers. On the other hand, security experts have
developed antispam engines against spam attacks. At first, it
works well but causes another side effect. Some BBS spam-
bots use bypass attack to neutralize spam filters (aka false
negative), and some spam filters block even normal users‟
articles (aka false positive).
II. EXISTING WORK ON SPAM DETECTION
List FiltersA.
At present, there are many proposed and developed
software and filters aimed to mitigate spamming. These are
different attempts; each one has to fight spam from different
places and perspectives. For instance, list filters (i.e. the
Detecting Spambot As An Antispam Technique For Web Internet BBS
(IJSRD/Vol. 1/Issue 2/2013/0033)
All rights reserved by www.ijsrd.com
190
white, black, and gray filters) [6] concern more with the
trustable sender’s address that is usually placed at the top of
the DNS server (i.e. as in the DNSBL applications).
Whitelist maintains the list of the e-mails that the users wish
to receive mail Blacklist maintains the list of the e-mails that
the users does not wish to receive mails. Graylist maintains
the intermediate list of the e-mails where the users who have
frequently sends the mail within N hours/minute can be
stored and accordingly the user can wish to enter that
particular e-mail in blacklist or whitelist.
Domain Name System-BlackList (DNSBL)B.
One of the well-known techniques that are being
used is the DNSBL and it is used by the Mail Abuse
Prevention [5]. Basically, it is a real-time database that
contains IPs of all the discovered spams such as bots and
Trojans. The DNSBL is built at the high level of the DNS
server, which is the largest distributed database that contains
IPs, and records of names for each domain. The record that
points to the mail service is the Mail Exchanger (MX). The
mail server checks for MX record that belongs to the
receiver‟s e-mails. However, if the sender’s IP is already
listed in the black list, the server will reject the connection
and aborts from providing the MTA with the MX record.
Signature-based Spam DetectionC.
Signature-based Spam Detection is a widely used
in many mail server systems and it depends on some
statistical methods to produce hash value, which is attached
with each e-mail to become a marker or signature that
classifies the e-mail. By making a comparison with the spam
e-mails discovered earlier, the received e-mail is recognized
and marked as a spam. Then, this e-mail hash value is stored
and distributed to all the filters that use signature technique.
It is difficult to calculate the hash value because it depends
on specific structures and words that e-mails contain, such
as (porn materials, Click Here, Join Us) which give a
suspicious value to the e-mail weight. Hash technique or
signature gives accepted prevention an improbable
percentage to classify legitimate e-mails as spam because it
depends on the calculated hash value of the e-mails that are
reported as spam.
III. BEHAVIORAL-BASED SPAMMING DETECTOR
Information extracted from the network-level
traffic has several advantages, Network-level information is
clear and closer to the spam source than e-mails header and
content [11]. One of the advantages of the behaviour-based
technique is the ability to detect zero-day spam bots and its
potential for early detection. It can be used to detect the
spamming attempts before the end of the spam sending
session. Hence, recent studies focus on the abnormal
behavioural detection. Since spam is an abnormal behaviour,
and it uses and consumes the network resources illegally.
This abnormal behaviour leaves evidence that point to its
occurrence on the network.
 A BSD framework
The proposed system as shown in Figure 2 above is
divided into four main stages; preparing the system’s
settings, capturing, analysis, and results. At the first stage,
the system is prepared by configuring and adding the
required variables. At the second stage, the packets are
captured and filtered. Then, the third stage is decoding and
classifying the packets and inserting the required traffic into
the database.
Fig 2: BSD Framework
After that the timer (T) equalizes the observation
period (Op). The next process is to analyse and extract the
useful information from the captured packets that are
inserted into the database, and then extracting the abnormal
behaviours in the captured traffic. Finally, the relation rate
will be calculated to decide whether the detected host
behaviours during the observation period can lead to detect a
spam bot activities and spamming attempts on the network.
 PREPARING THE SYSTEM:
The following points summarize all the necessary values
and information required to start the system:
1) Mail Server MAC and IP Address
2) Mail Servers Priority as stated in the MX Query reply
3) SMTP port used in the SMTP server (default value
25)
4) Other variables used in the programming application
 CAPTURING AND DECODING STAGE:
The packets that traverse the network are captured and
filtered. The filters are used to reduce the number of the
packets to be processed are listed below. • IP Source and IP
Destination within local network IP range. AND • TCP/IP
“0x06”. AND • Source Port is SMTP port (default 25).
Finally, the packets are inserted into the buffer. The buffer is
based on the Queue technique; FIFO (first in first out) to
keep the packet in the same order as sniffed. The buffer
places all the packets directly in the system, and keeps
capturing them without delay.
 DECODE AND CLASSIFY PACKETS:
This stage begins when the buffer is not empty; it starts to
get packets from the buffer, then decodes and classifies the
packets into either SMTP connection packets or service
scanning attempts packets. Then, the packets are stored into
the system’s database to be analysed and mined later in the
next stage. After filtering the packets, they are presented as
either established SMTP connection packets, or initiating
Detecting Spambot As An Antispam Technique For Web Internet BBS
(IJSRD/Vol. 1/Issue 2/2013/0033)
All rights reserved by www.ijsrd.com
191
SMTP connection packets through the TCP three
handshakes with the destination SMTP port.
 IDENTIFYING THE HOST’S BEHAVIOUR:
This stage starts once the observation period ends and is
determined by the system administrator (tn: is the observer
period). Analyzing the packets collected from the previous
stage is done at this stage. It involves several tests and
analysis procedures to extract and count the total number of
occurrence in the network during the experiments of each
behaviour.
IV. ANTISPAM TECHNIQUE FOR BBS
IntroductionA.
According to the survey of BBS spams[4], other
secure input modules for web applications to block BBS
spam-bots [3] were also developed. Figure 1 shows the
characteristics of each technology.
1) WORD FILTER: It checks suspicious words that
frequently used in spam articles, e.g. bacara, sex, adult. If a
filter detects these words in an article, then it blocks the
article. But so many variants and bypass attacks can be
possible.
2) IP BLACK / WHITE LIST: A source IP address is
examined and if it is on the black list, then articles posted
from the IP address are blocked. But it cannot block spam
articles posted via a proxy server since the IP address of the
proxy server may not on the black list. In addition, it is hard
to block attacks that are using CSRF(Cross Site Request
Forgery).
Fig 3: Characteristics of Antispam technologies
3) BLOCKING ARTICLES WITH TOO MANY LINKS:
It is based on characteristics of spam articles. There usually
are many links in an article if the article is for
advertisement, which was reported in 2008. It exploits the
Zeroboard (origin of Xpress Engine) administration module
vulnerability.
4) FILTERING ARTICLES WITH A FOREIGN
LANGUAGE ONLY (domestic service site only) This
filtering mechanism is effective only in non-English-
speaking countries. Most of articles written in a foreign
language are spams.
5) SCRIPT FILTER: Some spam-bots launch XSS attacks.
These bots usually change a victim’s URL address to their
own site address. So blocking script tag is very effective to
block spams.
6) CHECKING WHETHER A LIST/INDEX PAGE WAS
ACCESSED Most of spam bots directly request write pages
without visiting an index / list page.
7) MANDATORY INCLUSION OF CERTAIN
KEYWORDS: A system can block article posting if the
article doesn’t include specific keywords (usually
configured by an administrator) [5]. It is effective for block
spam articles but it can cause users‟ inconvenience.
8) TIME INTERVAL CHECK: Spam bots usually post
many articles in a short time interval. This filtering
mechanism checks a time interval between two postings
from the same user. If it is too short, the system will block
postings from this user.
9) DOMESTIC CLIENT CHECK (domestic service site
only) Similar to the IP blacklist mechanism and the foreign
language filtering mechanism, this mechanism filters articles
posted foreign servers.
10) QUIZ / AUTHENTICATION INPUT: This mechanism
uses a quiz or a distorted image which only humans can
solve [3]. It is one of the most effective ways to block spam
articles, but it can also cause users‟ inconvenience.
11) TOKEN / REFERRER CHECK This mechanism is
usually used for open source boards. Each site builder adds
extra hidden form fields to verify automated postings which
exploit open-source web boards.
Mechanism for adaptable Antispam techniquesB.
Adaptable anti-spam engine has 3-step filters followed by:
 Low level filter : simple / small overhead
 Mid-level filter : more strict policy / allows large
overhead
 High level filter : only humans can pass / can cause
inconvenience
Fig 4: Mechanism for Antispam techniqueh
 LOW LEVEL ANTISPAM POLICY should cause
the least overhead to server and allowed to cause some false
positives (like simple word filter method). If spam-
suspicious article is blocked by low level spam filter, then it
will be checked with mid level anti-spam policy.
 MID LEVEL FILTER has more strict policy and
may cause some performance down (like comparing with
large spammer IP list table). Site builders can be free from
server performance problem caused by spam filter, because
most of normal article will be posted through just only low
level spam filter. It means that anti-spam engine can embed
Detecting Spambot As An Antispam Technique For Web Internet BBS
(IJSRD/Vol. 1/Issue 2/2013/0033)
All rights reserved by www.ijsrd.com
192
effective mid/high level spam filters which have side effect
like performance down. By the flexibility of this engine, low
level filter can use anti-spam policy which can cause
frequent false positive.
High level which is the final step filter has the strictest anti-
spam policy. It needs extra input that only humans can
solve, like typing authentication word from distorted image
[3,7]. Or getting answer from simple quiz can be another
solution (of course, it should not be solved automatically).
These methods are effective to block spam articles, but may
cause inconvenience to visitors. So site builders should
embed and design properly first two filters that high level
filters should be rarely applied to normal articles.
V. CONCLUSION
The behavioral-based Spamming Detector (BSD) system is
the one and only one method that we can find more relevant
because it more focuses on multiple behaviors on the
network which are considered as spam related activity. The
main function of the BSD system is to constantly monitor
the network level traffic where its information is constant
and closer to the sources. Network traffic information is
more trustable than the information extracted from the e-
mail header at the application layer. BSD system is
implemented by using java in the java RCP-eclipse
environment.
As there is some misunderstanding between the
BBS spammers and the site builders, many customers or
normal visitors feels incompatibility for such spam articles
and their respective strict spam policies. But the solution
that proposed in this paper can solve these two problems
flexibly. Of course, some variant forms of spam-bots will
appear someday and more advanced anti-spam technologies
will be preceded, as it has been done. We expect this
adaptable anti-spam technology can block the most of spam
articles for a while.
REFERENCES
[1] Mohammed Fadhil Zamil, Ahmed M. Manasrah, Omar
Amir, Sureswaran Ramadass “A BEHAVIOR BASED
ALGORITHM TO DETECT SPAM BOTS” National
Advanced IPv6 Center, Universiti Sains Malaysia.
[2] Joonmo Hong, Boo Joong Kang, Eul Gyu Im
“ADAPTABLE ANTI-SPAM TECHNIQUE FOR THE
INTERNET WEB BBS” Division of Computer Science &
Engineering, Hanyang University, Seoul, 133-791
[3] R. Qiong, M. Yi, & W. Susilo, “SEFAP: An Email System
for Anti-Phishing,” ICIS 6th IEEE/ACIS International
Conference on Computer and Information Science, pp. 782-
787, 2007.
[4] J. S. Sauver, “Spam Zombies and Inbound Flows to
Compromised Customer Systems,” AAWG
[5] Z. Zhaosheng, L. Guohan, C. Yan, Z.J. Fu, P. Roberts, and
H. Keesook, “Botnet Research Survey,” Computer Software
and Applications. COMPSAC '08. 32nd Annual IEEE
International, pp. 967-972, 2008.
[6] Y. Miao, J. Qiu-Xiang, and M. Fan-Jin, “The Spam Filtering
Technology Based on SVM and D-S Theory,” Knowledge
Discovery and Data Mining, 2008. WKDD. First
International Workshop on, pp. 562-565, 2008.
[7] Introduction to the Realtime Blackhole List (RBL). MAPS-
Global Secure Systems [website], Nov 28, 2008, Available:
http://www.mailabuse.com/wp_introrbl.html.

More Related Content

What's hot

Web Spam Detection Using Machine Learning
Web Spam Detection Using Machine LearningWeb Spam Detection Using Machine Learning
Web Spam Detection Using Machine Learningbutest
 
A multi layer architecture for spam-detection system
A multi layer architecture for spam-detection systemA multi layer architecture for spam-detection system
A multi layer architecture for spam-detection systemcsandit
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR SpamGFI Software
 
E-Mail Security Using Spam Mail Detection and Filtering System
E-Mail Security Using Spam Mail Detection and Filtering SystemE-Mail Security Using Spam Mail Detection and Filtering System
E-Mail Security Using Spam Mail Detection and Filtering Systemrahulmonikasharma
 
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS
TOOLS AND TECHNIQUES FOR NETWORK FORENSICSTOOLS AND TECHNIQUES FOR NETWORK FORENSICS
TOOLS AND TECHNIQUES FOR NETWORK FORENSICSIJNSA Journal
 
A framework to detect novel computer viruses via system calls
A framework to detect novel computer viruses via system callsA framework to detect novel computer viruses via system calls
A framework to detect novel computer viruses via system callsUltraUploader
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniquesranjit banshpal
 
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIdentifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIRJET Journal
 
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...IJNSA Journal
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentationnewsan2001
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam FilteringiNazneen
 
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERSAN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERSijsrd.com
 

What's hot (19)

Spam and Anti Spam Techniques
Spam and Anti Spam TechniquesSpam and Anti Spam Techniques
Spam and Anti Spam Techniques
 
ACO-email spam filtering
ACO-email spam filtering ACO-email spam filtering
ACO-email spam filtering
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
Web Spam Detection Using Machine Learning
Web Spam Detection Using Machine LearningWeb Spam Detection Using Machine Learning
Web Spam Detection Using Machine Learning
 
A multi layer architecture for spam-detection system
A multi layer architecture for spam-detection systemA multi layer architecture for spam-detection system
A multi layer architecture for spam-detection system
 
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERINGDEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR Spam
 
E-Mail Security Using Spam Mail Detection and Filtering System
E-Mail Security Using Spam Mail Detection and Filtering SystemE-Mail Security Using Spam Mail Detection and Filtering System
E-Mail Security Using Spam Mail Detection and Filtering System
 
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS
TOOLS AND TECHNIQUES FOR NETWORK FORENSICSTOOLS AND TECHNIQUES FOR NETWORK FORENSICS
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS
 
A framework to detect novel computer viruses via system calls
A framework to detect novel computer viruses via system callsA framework to detect novel computer viruses via system calls
A framework to detect novel computer viruses via system calls
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIdentifying Malicious Data in Social Media
Identifying Malicious Data in Social Media
 
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentation
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
 
Spam
SpamSpam
Spam
 
Spam
SpamSpam
Spam
 
Spam Email identification
Spam Email identificationSpam Email identification
Spam Email identification
 
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERSAN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
 

Viewers also liked

Performance of Multiple symbol representation with clipping scheme for PAPR r...
Performance of Multiple symbol representation with clipping scheme for PAPR r...Performance of Multiple symbol representation with clipping scheme for PAPR r...
Performance of Multiple symbol representation with clipping scheme for PAPR r...ijsrd.com
 
Computational analysis of heat transfer through four-stroke S. I. engine fins
Computational analysis of heat transfer through four-stroke S. I. engine finsComputational analysis of heat transfer through four-stroke S. I. engine fins
Computational analysis of heat transfer through four-stroke S. I. engine finsijsrd.com
 
ME3102 Final Presentation
ME3102 Final PresentationME3102 Final Presentation
ME3102 Final Presentationchenxianghao
 
EXPERIMENTAL AND THEORTICAL STUDY OF THE THERMAL PERFORMANCE OF HEAT PIPE HEA...
EXPERIMENTAL AND THEORTICAL STUDY OF THE THERMAL PERFORMANCE OF HEAT PIPE HEA...EXPERIMENTAL AND THEORTICAL STUDY OF THE THERMAL PERFORMANCE OF HEAT PIPE HEA...
EXPERIMENTAL AND THEORTICAL STUDY OF THE THERMAL PERFORMANCE OF HEAT PIPE HEA...IAEME Publication
 
design and analysis of heat exchanger
design and analysis of heat exchangerdesign and analysis of heat exchanger
design and analysis of heat exchangerAkash Behl
 
Basic Hydraulic Fracturing
Basic Hydraulic FracturingBasic Hydraulic Fracturing
Basic Hydraulic FracturingJames Craig
 
Heat exchangers and types
Heat exchangers and typesHeat exchangers and types
Heat exchangers and typesGopesh Chilveri
 
Heat Exchangers
Heat ExchangersHeat Exchangers
Heat ExchangersSABIC
 

Viewers also liked (12)

Performance of Multiple symbol representation with clipping scheme for PAPR r...
Performance of Multiple symbol representation with clipping scheme for PAPR r...Performance of Multiple symbol representation with clipping scheme for PAPR r...
Performance of Multiple symbol representation with clipping scheme for PAPR r...
 
Computational analysis of heat transfer through four-stroke S. I. engine fins
Computational analysis of heat transfer through four-stroke S. I. engine finsComputational analysis of heat transfer through four-stroke S. I. engine fins
Computational analysis of heat transfer through four-stroke S. I. engine fins
 
Heat exchanger
Heat exchangerHeat exchanger
Heat exchanger
 
ME3102 Final Presentation
ME3102 Final PresentationME3102 Final Presentation
ME3102 Final Presentation
 
Diamond & diaper design
Diamond &  diaper design Diamond &  diaper design
Diamond & diaper design
 
EXPERIMENTAL AND THEORTICAL STUDY OF THE THERMAL PERFORMANCE OF HEAT PIPE HEA...
EXPERIMENTAL AND THEORTICAL STUDY OF THE THERMAL PERFORMANCE OF HEAT PIPE HEA...EXPERIMENTAL AND THEORTICAL STUDY OF THE THERMAL PERFORMANCE OF HEAT PIPE HEA...
EXPERIMENTAL AND THEORTICAL STUDY OF THE THERMAL PERFORMANCE OF HEAT PIPE HEA...
 
design and analysis of heat exchanger
design and analysis of heat exchangerdesign and analysis of heat exchanger
design and analysis of heat exchanger
 
Twill weave fabric structre
Twill weave fabric structreTwill weave fabric structre
Twill weave fabric structre
 
Basic Hydraulic Fracturing
Basic Hydraulic FracturingBasic Hydraulic Fracturing
Basic Hydraulic Fracturing
 
Heat exchangers and types
Heat exchangers and typesHeat exchangers and types
Heat exchangers and types
 
Heat Exchangers
Heat ExchangersHeat Exchangers
Heat Exchangers
 
Heat exchangers
Heat exchangersHeat exchangers
Heat exchangers
 

Similar to Detecting Spambot as an Antispam Technique for Web Internet BBS

Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkEditor IJCATR
 
Monitoring the Spread of Active Worms in Internet
Monitoring the Spread of Active Worms in InternetMonitoring the Spread of Active Worms in Internet
Monitoring the Spread of Active Worms in InternetIOSR Journals
 
Overview of Anti-spam filtering Techniques
Overview of Anti-spam filtering TechniquesOverview of Anti-spam filtering Techniques
Overview of Anti-spam filtering TechniquesIRJET Journal
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The BotmasterIJERA Editor
 
A Model for Fuzzy Logic Based Machine Learning Approach for Spam Filtering
A Model for Fuzzy Logic Based Machine Learning Approach for  Spam FilteringA Model for Fuzzy Logic Based Machine Learning Approach for  Spam Filtering
A Model for Fuzzy Logic Based Machine Learning Approach for Spam FilteringIOSR Journals
 
Botnet Detection in Online-social Network
Botnet Detection in Online-social NetworkBotnet Detection in Online-social Network
Botnet Detection in Online-social NetworkRubal Sagwal
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Network Threats
Network ThreatsNetwork Threats
Network ThreatsDan Oblak
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1Dhara Shah
 
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMSWORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMSIJNSA Journal
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 
E-mail and Instant MessagingChapter 16Principles of Co.docx
E-mail and Instant MessagingChapter 16Principles of Co.docxE-mail and Instant MessagingChapter 16Principles of Co.docx
E-mail and Instant MessagingChapter 16Principles of Co.docxbrownliecarmella
 
IRJET- Image Spam Detection: Problem and Existing Solution
IRJET-  	  Image Spam Detection: Problem and Existing SolutionIRJET-  	  Image Spam Detection: Problem and Existing Solution
IRJET- Image Spam Detection: Problem and Existing SolutionIRJET Journal
 
miniproject.ppt.pptx
miniproject.ppt.pptxminiproject.ppt.pptx
miniproject.ppt.pptxAnush90
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)sadique_ghitm
 
Analysis of an image spam in email based on content analysis
Analysis of an image spam in email based on content analysisAnalysis of an image spam in email based on content analysis
Analysis of an image spam in email based on content analysisijnlc
 
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingIdentification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingEditor IJCATR
 

Similar to Detecting Spambot as an Antispam Technique for Web Internet BBS (20)

Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
 
Monitoring the Spread of Active Worms in Internet
Monitoring the Spread of Active Worms in InternetMonitoring the Spread of Active Worms in Internet
Monitoring the Spread of Active Worms in Internet
 
Overview of Anti-spam filtering Techniques
Overview of Anti-spam filtering TechniquesOverview of Anti-spam filtering Techniques
Overview of Anti-spam filtering Techniques
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The Botmaster
 
A Model for Fuzzy Logic Based Machine Learning Approach for Spam Filtering
A Model for Fuzzy Logic Based Machine Learning Approach for  Spam FilteringA Model for Fuzzy Logic Based Machine Learning Approach for  Spam Filtering
A Model for Fuzzy Logic Based Machine Learning Approach for Spam Filtering
 
Botnet Detection in Online-social Network
Botnet Detection in Online-social NetworkBotnet Detection in Online-social Network
Botnet Detection in Online-social Network
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Network Threats
Network ThreatsNetwork Threats
Network Threats
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1
 
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMSWORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
E-mail and Instant MessagingChapter 16Principles of Co.docx
E-mail and Instant MessagingChapter 16Principles of Co.docxE-mail and Instant MessagingChapter 16Principles of Co.docx
E-mail and Instant MessagingChapter 16Principles of Co.docx
 
IRJET- Image Spam Detection: Problem and Existing Solution
IRJET-  	  Image Spam Detection: Problem and Existing SolutionIRJET-  	  Image Spam Detection: Problem and Existing Solution
IRJET- Image Spam Detection: Problem and Existing Solution
 
miniproject.ppt.pptx
miniproject.ppt.pptxminiproject.ppt.pptx
miniproject.ppt.pptx
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)
 
Analysis of an image spam in email based on content analysis
Analysis of an image spam in email based on content analysisAnalysis of an image spam in email based on content analysis
Analysis of an image spam in email based on content analysis
 
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingIdentification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using Voting
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 

Detecting Spambot as an Antispam Technique for Web Internet BBS

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 2, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 189 Detecting Spambot as an Antispam Technique for Web Internet BBS 1 Juned M Laliwala 2 Girish Khilari 1 Gujarat Technological University PG School, Ahmedabad, Gujarat 2 MS (Software Systems),BITS Pilani Abstract— Spam which is one of the most popular and also the most relevant topic that needs to be understood in the current scenario. Everyone whether it may be a small child or an old person are using emails everyday all around the world. The scenario which we are seeing is that almost no one is aware or in simple sentence they do not know what actually the spam is and what they will do in their systems. Spam in general means unsolicited or unwanted mails. Botnets are considered one of the main source of the spam. Botnet means the group of software’s called bots and the function of these bots is to run on several compromised computers autonomously and automatically. The main objective of this paper is to detect such a bot or spambots for the Bulletin Board System (BBS). BBS is a computer that is running software that allows users to leave a message and access information of general interest. Originally BBSes were accessed only over a phone line using a modem, but nowadays some BBSes allowed access via a Telnet, packet switched network, or packet radio connection. The main methodology that we are going to focus is on Behavioural- based Spam Detection (BSD) method. Behavioral-based Spam Detector (BSD) combines several behaviours of the spam bots at different stages including the behaviour of spam preparation before the spam session when the spammers search for an open relay SMTP service to send e- mails through, and the behaviour of spammers while connecting to the mail server. Detecting the abnormal behaviour produced by the spam activities gives a high rate of suspicion on the existence of bots. Keywords— SPAM, Botnet detection, Network threat detection, Network worm detection. I. INTRODUCTION There are several challenges facing the e-mail systems; for example, the increase of harmful techniques has forced e- mail users to search for the higher degree of safety and privacy to ensure the security of the transmitted information [1]. This is due to the recent spread of viruses, hackers, malwares, worms, and Botnets. Spam is one of these challenges that abuse the electronic messaging system by sending a huge amount of unrequested bulk messages randomly that makes up of 80% of the emails as a spam [2]. The reason behind this high percentage is due to the armies of the harmful bots that are controlled by a bot master. Botnets refer to a group of software called „bots‟ or „robots‟. The function of these bots is to run on several computers autonomously and automatically [3]. This kind of software usually `works at the end-user system that has been infected. Once these bots are installed, they send an identification message to the bot master. Fig1. Botnet Architecture The bot master can start any command and control session by using these infected computers that are called „zombies‟. The bot master performs illegal attacks on all these zombies. Bots work under the shadow to avoid being detected by an antivirus or observed by the user. Bots software has the ability to disable the antivirus effect by producing an anti- antivirus [2]. The best time for the bots to start performing their activities is during the idle period of the host computer. This happens especially when the bots sense the low CPU utilization; hence they start to take advantage of the infected host resources to do their desired activities. As the Internet becomes more and more popular, the Internet becomes not only sources of providing information, but also channels of effective communication. Since the Internet may cause severe effects to their society [1], most of political organizations and media companies keep monitoring information posted on popular websites. Web sites like CNN or Facebook, which have millions of daily visits, provide service spaces for communication. Most of people regard such a space as a powerful way to communicate with others, but spammers think this space as a powerful way to advertise their contents in an illegal manner. Advertisements by spammers exist especially on BBS (Bulletin Board System) in major media web sites (like CNN and The Times) or YouTube comment pages. So developing a BBS anti-spam module for public websites is no option for website builders. So many kinds of spam-bots on BBS were invented and used to generate spams by attackers. On the other hand, security experts have developed antispam engines against spam attacks. At first, it works well but causes another side effect. Some BBS spam- bots use bypass attack to neutralize spam filters (aka false negative), and some spam filters block even normal users‟ articles (aka false positive). II. EXISTING WORK ON SPAM DETECTION List FiltersA. At present, there are many proposed and developed software and filters aimed to mitigate spamming. These are different attempts; each one has to fight spam from different places and perspectives. For instance, list filters (i.e. the
  • 2. Detecting Spambot As An Antispam Technique For Web Internet BBS (IJSRD/Vol. 1/Issue 2/2013/0033) All rights reserved by www.ijsrd.com 190 white, black, and gray filters) [6] concern more with the trustable sender’s address that is usually placed at the top of the DNS server (i.e. as in the DNSBL applications). Whitelist maintains the list of the e-mails that the users wish to receive mail Blacklist maintains the list of the e-mails that the users does not wish to receive mails. Graylist maintains the intermediate list of the e-mails where the users who have frequently sends the mail within N hours/minute can be stored and accordingly the user can wish to enter that particular e-mail in blacklist or whitelist. Domain Name System-BlackList (DNSBL)B. One of the well-known techniques that are being used is the DNSBL and it is used by the Mail Abuse Prevention [5]. Basically, it is a real-time database that contains IPs of all the discovered spams such as bots and Trojans. The DNSBL is built at the high level of the DNS server, which is the largest distributed database that contains IPs, and records of names for each domain. The record that points to the mail service is the Mail Exchanger (MX). The mail server checks for MX record that belongs to the receiver‟s e-mails. However, if the sender’s IP is already listed in the black list, the server will reject the connection and aborts from providing the MTA with the MX record. Signature-based Spam DetectionC. Signature-based Spam Detection is a widely used in many mail server systems and it depends on some statistical methods to produce hash value, which is attached with each e-mail to become a marker or signature that classifies the e-mail. By making a comparison with the spam e-mails discovered earlier, the received e-mail is recognized and marked as a spam. Then, this e-mail hash value is stored and distributed to all the filters that use signature technique. It is difficult to calculate the hash value because it depends on specific structures and words that e-mails contain, such as (porn materials, Click Here, Join Us) which give a suspicious value to the e-mail weight. Hash technique or signature gives accepted prevention an improbable percentage to classify legitimate e-mails as spam because it depends on the calculated hash value of the e-mails that are reported as spam. III. BEHAVIORAL-BASED SPAMMING DETECTOR Information extracted from the network-level traffic has several advantages, Network-level information is clear and closer to the spam source than e-mails header and content [11]. One of the advantages of the behaviour-based technique is the ability to detect zero-day spam bots and its potential for early detection. It can be used to detect the spamming attempts before the end of the spam sending session. Hence, recent studies focus on the abnormal behavioural detection. Since spam is an abnormal behaviour, and it uses and consumes the network resources illegally. This abnormal behaviour leaves evidence that point to its occurrence on the network.  A BSD framework The proposed system as shown in Figure 2 above is divided into four main stages; preparing the system’s settings, capturing, analysis, and results. At the first stage, the system is prepared by configuring and adding the required variables. At the second stage, the packets are captured and filtered. Then, the third stage is decoding and classifying the packets and inserting the required traffic into the database. Fig 2: BSD Framework After that the timer (T) equalizes the observation period (Op). The next process is to analyse and extract the useful information from the captured packets that are inserted into the database, and then extracting the abnormal behaviours in the captured traffic. Finally, the relation rate will be calculated to decide whether the detected host behaviours during the observation period can lead to detect a spam bot activities and spamming attempts on the network.  PREPARING THE SYSTEM: The following points summarize all the necessary values and information required to start the system: 1) Mail Server MAC and IP Address 2) Mail Servers Priority as stated in the MX Query reply 3) SMTP port used in the SMTP server (default value 25) 4) Other variables used in the programming application  CAPTURING AND DECODING STAGE: The packets that traverse the network are captured and filtered. The filters are used to reduce the number of the packets to be processed are listed below. • IP Source and IP Destination within local network IP range. AND • TCP/IP “0x06”. AND • Source Port is SMTP port (default 25). Finally, the packets are inserted into the buffer. The buffer is based on the Queue technique; FIFO (first in first out) to keep the packet in the same order as sniffed. The buffer places all the packets directly in the system, and keeps capturing them without delay.  DECODE AND CLASSIFY PACKETS: This stage begins when the buffer is not empty; it starts to get packets from the buffer, then decodes and classifies the packets into either SMTP connection packets or service scanning attempts packets. Then, the packets are stored into the system’s database to be analysed and mined later in the next stage. After filtering the packets, they are presented as either established SMTP connection packets, or initiating
  • 3. Detecting Spambot As An Antispam Technique For Web Internet BBS (IJSRD/Vol. 1/Issue 2/2013/0033) All rights reserved by www.ijsrd.com 191 SMTP connection packets through the TCP three handshakes with the destination SMTP port.  IDENTIFYING THE HOST’S BEHAVIOUR: This stage starts once the observation period ends and is determined by the system administrator (tn: is the observer period). Analyzing the packets collected from the previous stage is done at this stage. It involves several tests and analysis procedures to extract and count the total number of occurrence in the network during the experiments of each behaviour. IV. ANTISPAM TECHNIQUE FOR BBS IntroductionA. According to the survey of BBS spams[4], other secure input modules for web applications to block BBS spam-bots [3] were also developed. Figure 1 shows the characteristics of each technology. 1) WORD FILTER: It checks suspicious words that frequently used in spam articles, e.g. bacara, sex, adult. If a filter detects these words in an article, then it blocks the article. But so many variants and bypass attacks can be possible. 2) IP BLACK / WHITE LIST: A source IP address is examined and if it is on the black list, then articles posted from the IP address are blocked. But it cannot block spam articles posted via a proxy server since the IP address of the proxy server may not on the black list. In addition, it is hard to block attacks that are using CSRF(Cross Site Request Forgery). Fig 3: Characteristics of Antispam technologies 3) BLOCKING ARTICLES WITH TOO MANY LINKS: It is based on characteristics of spam articles. There usually are many links in an article if the article is for advertisement, which was reported in 2008. It exploits the Zeroboard (origin of Xpress Engine) administration module vulnerability. 4) FILTERING ARTICLES WITH A FOREIGN LANGUAGE ONLY (domestic service site only) This filtering mechanism is effective only in non-English- speaking countries. Most of articles written in a foreign language are spams. 5) SCRIPT FILTER: Some spam-bots launch XSS attacks. These bots usually change a victim’s URL address to their own site address. So blocking script tag is very effective to block spams. 6) CHECKING WHETHER A LIST/INDEX PAGE WAS ACCESSED Most of spam bots directly request write pages without visiting an index / list page. 7) MANDATORY INCLUSION OF CERTAIN KEYWORDS: A system can block article posting if the article doesn’t include specific keywords (usually configured by an administrator) [5]. It is effective for block spam articles but it can cause users‟ inconvenience. 8) TIME INTERVAL CHECK: Spam bots usually post many articles in a short time interval. This filtering mechanism checks a time interval between two postings from the same user. If it is too short, the system will block postings from this user. 9) DOMESTIC CLIENT CHECK (domestic service site only) Similar to the IP blacklist mechanism and the foreign language filtering mechanism, this mechanism filters articles posted foreign servers. 10) QUIZ / AUTHENTICATION INPUT: This mechanism uses a quiz or a distorted image which only humans can solve [3]. It is one of the most effective ways to block spam articles, but it can also cause users‟ inconvenience. 11) TOKEN / REFERRER CHECK This mechanism is usually used for open source boards. Each site builder adds extra hidden form fields to verify automated postings which exploit open-source web boards. Mechanism for adaptable Antispam techniquesB. Adaptable anti-spam engine has 3-step filters followed by:  Low level filter : simple / small overhead  Mid-level filter : more strict policy / allows large overhead  High level filter : only humans can pass / can cause inconvenience Fig 4: Mechanism for Antispam techniqueh  LOW LEVEL ANTISPAM POLICY should cause the least overhead to server and allowed to cause some false positives (like simple word filter method). If spam- suspicious article is blocked by low level spam filter, then it will be checked with mid level anti-spam policy.  MID LEVEL FILTER has more strict policy and may cause some performance down (like comparing with large spammer IP list table). Site builders can be free from server performance problem caused by spam filter, because most of normal article will be posted through just only low level spam filter. It means that anti-spam engine can embed
  • 4. Detecting Spambot As An Antispam Technique For Web Internet BBS (IJSRD/Vol. 1/Issue 2/2013/0033) All rights reserved by www.ijsrd.com 192 effective mid/high level spam filters which have side effect like performance down. By the flexibility of this engine, low level filter can use anti-spam policy which can cause frequent false positive. High level which is the final step filter has the strictest anti- spam policy. It needs extra input that only humans can solve, like typing authentication word from distorted image [3,7]. Or getting answer from simple quiz can be another solution (of course, it should not be solved automatically). These methods are effective to block spam articles, but may cause inconvenience to visitors. So site builders should embed and design properly first two filters that high level filters should be rarely applied to normal articles. V. CONCLUSION The behavioral-based Spamming Detector (BSD) system is the one and only one method that we can find more relevant because it more focuses on multiple behaviors on the network which are considered as spam related activity. The main function of the BSD system is to constantly monitor the network level traffic where its information is constant and closer to the sources. Network traffic information is more trustable than the information extracted from the e- mail header at the application layer. BSD system is implemented by using java in the java RCP-eclipse environment. As there is some misunderstanding between the BBS spammers and the site builders, many customers or normal visitors feels incompatibility for such spam articles and their respective strict spam policies. But the solution that proposed in this paper can solve these two problems flexibly. Of course, some variant forms of spam-bots will appear someday and more advanced anti-spam technologies will be preceded, as it has been done. We expect this adaptable anti-spam technology can block the most of spam articles for a while. REFERENCES [1] Mohammed Fadhil Zamil, Ahmed M. Manasrah, Omar Amir, Sureswaran Ramadass “A BEHAVIOR BASED ALGORITHM TO DETECT SPAM BOTS” National Advanced IPv6 Center, Universiti Sains Malaysia. [2] Joonmo Hong, Boo Joong Kang, Eul Gyu Im “ADAPTABLE ANTI-SPAM TECHNIQUE FOR THE INTERNET WEB BBS” Division of Computer Science & Engineering, Hanyang University, Seoul, 133-791 [3] R. Qiong, M. Yi, & W. Susilo, “SEFAP: An Email System for Anti-Phishing,” ICIS 6th IEEE/ACIS International Conference on Computer and Information Science, pp. 782- 787, 2007. [4] J. S. Sauver, “Spam Zombies and Inbound Flows to Compromised Customer Systems,” AAWG [5] Z. Zhaosheng, L. Guohan, C. Yan, Z.J. Fu, P. Roberts, and H. Keesook, “Botnet Research Survey,” Computer Software and Applications. COMPSAC '08. 32nd Annual IEEE International, pp. 967-972, 2008. [6] Y. Miao, J. Qiu-Xiang, and M. Fan-Jin, “The Spam Filtering Technology Based on SVM and D-S Theory,” Knowledge Discovery and Data Mining, 2008. WKDD. First International Workshop on, pp. 562-565, 2008. [7] Introduction to the Realtime Blackhole List (RBL). MAPS- Global Secure Systems [website], Nov 28, 2008, Available: http://www.mailabuse.com/wp_introrbl.html.