Submit Search
Upload
Tracking Spam Mails Using SPRT Algorithm With AAA
•
0 likes
•
36 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i3/IRJET-V4I3405.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
IJNSA Journal
Monitoring the Spread of Active Worms in Internet
Monitoring the Spread of Active Worms in Internet
IOSR Journals
2014_protect_presentation
2014_protect_presentation
Jeff Holland
B0940509
B0940509
IOSR Journals
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
International Journal of Technical Research & Application
A Survey: SMS Spam Filtering
A Survey: SMS Spam Filtering
ijtsrd
Complete guide to_email
Complete guide to_email
Rochelle Lee
Spam Email identification
Spam Email identification
Partnered Health
Recommended
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
IJNSA Journal
Monitoring the Spread of Active Worms in Internet
Monitoring the Spread of Active Worms in Internet
IOSR Journals
2014_protect_presentation
2014_protect_presentation
Jeff Holland
B0940509
B0940509
IOSR Journals
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
International Journal of Technical Research & Application
A Survey: SMS Spam Filtering
A Survey: SMS Spam Filtering
ijtsrd
Complete guide to_email
Complete guide to_email
Rochelle Lee
Spam Email identification
Spam Email identification
Partnered Health
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET Journal
4
4
aniketnimaje
5
5
aniketnimaje
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
IJET - International Journal of Engineering and Techniques
Spam and Anti Spam Techniques
Spam and Anti Spam Techniques
Mạnh Nguyễn Văn
A multi layer architecture for spam-detection system
A multi layer architecture for spam-detection system
csandit
Web Spam Detection Using Machine Learning
Web Spam Detection Using Machine Learning
butest
ChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetection
Daniel Liu
Intrusion detection system based on web usage mining
Intrusion detection system based on web usage mining
IJCSEA Journal
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless local area network
IAEME Publication
E mail image spam filtering techniques
E mail image spam filtering techniques
ranjit banshpal
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
eSAT Journals
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
eSAT Publishing House
Jt3616901697
Jt3616901697
IJERA Editor
Blockmail Technical White Paper
Blockmail Technical White Paper
niallmmackey
Network paperthesis2
Network paperthesis2
Dhara Shah
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET Journal
E spam
E spam
zelkan19
EMAIL SPAM DETECTION USING HYBRID ALGORITHM
EMAIL SPAM DETECTION USING HYBRID ALGORITHM
IRJET Journal
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
IRJET Journal
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET Journal
IRJET- Survey on Phishing Attack Detection and Mitigation
IRJET- Survey on Phishing Attack Detection and Mitigation
IRJET Journal
More Related Content
What's hot
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET Journal
4
4
aniketnimaje
5
5
aniketnimaje
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
IJET - International Journal of Engineering and Techniques
Spam and Anti Spam Techniques
Spam and Anti Spam Techniques
Mạnh Nguyễn Văn
A multi layer architecture for spam-detection system
A multi layer architecture for spam-detection system
csandit
Web Spam Detection Using Machine Learning
Web Spam Detection Using Machine Learning
butest
ChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetection
Daniel Liu
Intrusion detection system based on web usage mining
Intrusion detection system based on web usage mining
IJCSEA Journal
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless local area network
IAEME Publication
E mail image spam filtering techniques
E mail image spam filtering techniques
ranjit banshpal
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
eSAT Journals
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
eSAT Publishing House
Jt3616901697
Jt3616901697
IJERA Editor
Blockmail Technical White Paper
Blockmail Technical White Paper
niallmmackey
Network paperthesis2
Network paperthesis2
Dhara Shah
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET Journal
E spam
E spam
zelkan19
What's hot
(18)
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
4
4
5
5
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
Spam and Anti Spam Techniques
Spam and Anti Spam Techniques
A multi layer architecture for spam-detection system
A multi layer architecture for spam-detection system
Web Spam Detection Using Machine Learning
Web Spam Detection Using Machine Learning
ChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetection
Intrusion detection system based on web usage mining
Intrusion detection system based on web usage mining
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless local area network
E mail image spam filtering techniques
E mail image spam filtering techniques
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
Jt3616901697
Jt3616901697
Blockmail Technical White Paper
Blockmail Technical White Paper
Network paperthesis2
Network paperthesis2
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
E spam
E spam
Similar to Tracking Spam Mails Using SPRT Algorithm With AAA
EMAIL SPAM DETECTION USING HYBRID ALGORITHM
EMAIL SPAM DETECTION USING HYBRID ALGORITHM
IRJET Journal
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
IRJET Journal
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET Journal
IRJET- Survey on Phishing Attack Detection and Mitigation
IRJET- Survey on Phishing Attack Detection and Mitigation
IRJET Journal
IRJET- Email Spam Detection & Automation
IRJET- Email Spam Detection & Automation
IRJET Journal
Overview of Anti-spam filtering Techniques
Overview of Anti-spam filtering Techniques
IRJET Journal
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
IRJET Journal
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using Voting
Editor IJCATR
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
IRJET Journal
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
eSAT Publishing House
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
eSAT Journals
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
eSAT Publishing House
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
IRJET Journal
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
IRJET Journal
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET Journal
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
IRJET Journal
Detection of phishing websites
Detection of phishing websites
m srikanth
NetworkPaperthesis1
NetworkPaperthesis1
Dhara Shah
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET Journal
Similar to Tracking Spam Mails Using SPRT Algorithm With AAA
(20)
EMAIL SPAM DETECTION USING HYBRID ALGORITHM
EMAIL SPAM DETECTION USING HYBRID ALGORITHM
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Survey on Phishing Attack Detection and Mitigation
IRJET- Survey on Phishing Attack Detection and Mitigation
IRJET- Email Spam Detection & Automation
IRJET- Email Spam Detection & Automation
Overview of Anti-spam filtering Techniques
Overview of Anti-spam filtering Techniques
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using Voting
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
Detection of phishing websites
Detection of phishing websites
NetworkPaperthesis1
NetworkPaperthesis1
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET- Advanced Phishing Identification Technique using Machine Learning
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
Call girls in Ahmedabad High profile
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Recently uploaded
(20)
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Tracking Spam Mails Using SPRT Algorithm With AAA
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1763 Tracking spam mails using SPRT algorithm with AAA Deenashree M P1, Spoorthi A2, Johnpaul C I3 1 B.E, Dept of ISE, NIE, Karnataka, India 2 B.E, Dept of ISE, NIE, Karnataka, India 3Assistant Professor, Dept of ISE, NIE, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— A large number of compromised machines which are used to send spam mails have become a threat to organizations. There is increase in wastage of network bandwidth due to spamming. Thishasbecomea major challenge for administrators to identifyandblock the spammers in a network. Attack by Insiders has resulted in decreased reputation of the organization which is the major setback. Hence organizations need a system to validate users and to detect spam mails which is much needed in the society. Introduction The E-mail traffic consists of unsolicited messages called Spam. Email spam, also known as junk email or unsolicited bulk email, is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. Clicking on links in spam email may send users to phishing web sites or sites that are hosting malware. Dealing with Spam incurs highcostsfororganizations,promptingeffortsto try to reduce spam related costs by installing Spam Filters. Spamming causes wastage of network bandwidth. Attacks by Insiders have caused major threat to the organizations. So it is a significant challenge for system administrators to identify and block the spammers in a network. Spamming provides a key for attackers to recruit the large number of compromised machines. A major securitychallengeontheinternetistheexistence of a large number of compromisedmachinewhichhave been used to send spam mails and other security attacks including spamming and spreading malware, distributed denial of service(DDOS)attacks.Identifying and clearing compromised machines in a network remain a significant challenge for system administrators of network of all sizes. Literature Survey Based on email messages received at a large email service provider, two recent studies investigated the aggregate global characteristics of spamming botnets including the size of botnets andthespamming patterns of botnets[1]. These studies provided important insights into the aggregate global characteristicsofspammingbotnetsbyclusteringspam messagesreceivedattheproviderintospamcampaigns using embedded URLs and near-duplicate content clustering, respectively. Given that spammingprovides a key economic incentive for attackers to recruit the large number of compromised machines, we focus on the detection of the compromised machines in a network that are involved in the spamming activities, commonly known as spam zombies[1]. Recent studies show that SPOT is an effective and efficient system in automatically detecting compromised machines in a network [3]. When we compared spam detection algorithms, the performance of SPOT with two other spam zombie detection algorithms based on the number and percentage of spam messages forwarded by internalmachines,respectively,ithas beenobserved that SPOT outperforms those two detection algorithms [3]. In AAA concept, part of whose mechanism we are going to implement in our project, is said tobeefficient for networkmanagementand security in a network[2]. In AAA system architecture, a set of security mechanisms for real-time secondary market services have been proposed. In this architecture[2], the issues of authenticating and authorizing secondary users, synchronizing a group of secondary devices, managing
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1764 handoff, and detecting unauthorized spectrum usage are detected. A part of its mechanism isusedinorderto prevent unauthorized users from sending messages from the network. Proposed system Proposed system aims at the detection of the compromised machines in a network that are involved in the spamming activities, commonly known as spam zombies. It deletes email with attached viruses, detects and blocks the spam mailsbyusingSPRTalgorithmand generates a graph which gives the record of each individual spammer to know the frequency and probability. Proposed system consists of Authentication server which uses authentication, authorization and accounting (AAA) concept. Authentication server verifies whether the user is authenticated and authorized to send the mail, accounting maintains the log of emails sent. Mail server uses SPRT algorithm which detects spam mails andevery spam mail detected is blocked by the mail server but the spammer is notified that the mail has been sent. A record is maintained for every spam mail sent. Consists of four modules:Staffmachine,Authentication server, Mail server, Admin. Staff Machine Each user requests Authentication server for the registration. The request packet consistsof Username, Mac Id, Ip address, Machine name, Date and time. Checks the request status from Authentication server either accepted or rejected. If accepted, a private key is generated else the reason for rejection is viewed to the user. As shown in Fig. 3.1 If the user is validated as authentic then he can login to the system successfully and send mails. Fig. 3.1 Functionality of Authenticationserverandstaff machine Authentication server Authentication server grants the request for registration if the staff machine’s Mac Id, Ip address belongs to the same network and the user name, machine name are valid and gives a private key to that user. Authentication server also maintains user account. It stores user name, email id, password and “can send” (an option which tells if the user is authorized to send mail or not) in an xml file. When the user tries to login, it checks for authenticity and if it is valid then the user can successfully login and it logs this login activity by storing the Mac ID, Ip address, machine name and user name in an xml file along with public and privatekeyofthatmachineelseit will reject with a reason. Mail server Mail server is a multithreaded server to receive mail packets and to forward to authentication server. It consists of Background Processing :
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1765 a. Packet sniffer module: To capture each mail packet and identify source ip, packet data, packet size, packet length. b. Packet analyzer: Received packets should be parsedtoextractaboveinformationanddisplay continuously on server screen. c. Generate OTP and send to Authentication server: Authentication server encrypts OTP using public key stored during registration process and send to client. Client machine decrypts with private key and send back to Authentication server, if verified send TRUE to mail server and it forwards mail and maintain log, if false log is maintained to keep track of intruder. Monitors the number of mails received from each ip to find inflow packets from each client machine. Admin Fig. 3.2. Functionality of AAA Process start or stop service, configures SMTP settingstosendmail,maintainsa view log (content log) sent by intruder, statistics report of each user as number of spam mails sent as shown in Fig.3.2. Fig. 3.3 Working The overview and the workingofthecompletemodelis discussed in this paragraph. When the user logs in to the system, the mail is redirected to authentication server from the mail server for the account authentication and authorization of the user. The process is to request packets- Mac id, IP address, User name, Date and time. If the fields are valid, the account is authenticated and approved otherwise,rejected.The roles of logged in user- Is he eligible to send the mail? is checked. An OTP is generated to check for authorization. The next step is to detect if the mail is spam or not. For the same, in mail server SPRT algorithm is run. The system mails are applied to content based filtering process and pre-defined threshold valuesareconsideredtojudgeifthemailsare spam or not. If the mails are spam then they are blockedin the mail serverwithouttheknowledgeofthe sender. A graph is recorded secretly with coordinates as ip address vs the frequency of spam mail generation. According to the graph generated the organization can take necessary action. Conclusion By plotting a graph the number of observations required can be minimized hence makingitan effective and an efficient system. The graph contains IP address on x-axis and number of times the spam mails sent on y-axis. The system will work well in the environmentof dynamic IP address. Spam mails which are sent using the name of an organization can be prevented. If an insider of an organizationis generatingthe mailswhich he is not authorized/authenticated to send repeatedly,
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1766 this system automatically generates a statistical analysis of the number of times the same person is repeating the process. The AAA concept will authenticate, authorize and does accounting of the spam mails sent. Thereisan increase in efficiency of the system as the SPRT algorithm is not run unless the user is authenticated and therefore, protect the integrity and blockthespam mails. Future Scope Threats from outside the organizations have increased so building a system that will monitor the spam mails coming from outside and blocking them such that the threats from outside the organization can be reduced. To build a system which will provide security for the insiders in any organization from receiving spam mails. REFERENCES [1] Zhenhai Duan, Senior Member, IEEE, Peng Chen, Fernando Sanchez, Yingfei Dong, Member, IEEE, Mary Stephenson, and James Michael Barker,” DetectingSpam Zombies by Monitoring Outgoing Messages”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 2, MARCH/APRIL 2012. [2] “On the architecture of Authentication, Authorization and Accounting forReal time secondarymarketservices” Yihong Zhou, Dapeng Wu and Scott M. Nettles INTERNATIONAL JOURNAL OF WIRELESSANDMOBILE COMPUTING, JAN 2005. [3] “Detecting Spam Zombies UsingSpotTool ByMonitoring Outgoing Messages” INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER SCIENCE AND SOFTWARE ENGINEERING, Volume 3, Issue 4, April 2013.
Download now