SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 5 (Mar. - Apr. 2013), PP 52-55
www.iosrjournals.org
www.iosrjournals.org 52 | Page
Monitoring the Spread of Active Worms in Internet
Mr.V.Senthilkumar , M.Tech IT , Mrs.P.Chitrakala, Asst Prof.
Dept. of Information Technology, Hindustan Institute of Technology and Science, Chennai India.
Abstract: As far as security is concerned compromised system plays a vital role i.e., system connected with a
network and which is used to send spamming, malware, identity theft etc. A System is developed mainly to
focus on detection of compromised machines which is already being affected by hacker or cracker and used for
anti social activities. We have developed an effective solution for detecting compromised system named
“SPOT”. SPOT uses SPRT (Sequence probability ratio test) which has false positive and false positive error
rates. This SPOT is an effective and efficient system in detecting compromised machines in the network. To
implement a single remote address corresponds to a malicious scanner which works good in internet
environments. The main objective are effectively identifying the spam zombies and Denial of Services attack
using SPOT without any botnet spam signatures techniques on the network.
Keywords- Compromised machines, Malicious scanner, Spam filter, Machine creation, dynamic ip, Spam zombies.
I. Introduction
As the sub product of electronic mail services, spam became a serious issue in penetrating into any
mail system and this types of penetration is mainly used by hackers for stealing confidential data without the
knowledge of the user. Generally few hackers use worm which is standalone malware computer program that
spreads itself in order to spread to other computers. Compromised systems is generally known to be bots and
collection of bots controlled by single entity is known as botnets. This type of system comes into picture due to
weak security design of SMTP(Simple Mail Transfer Protocol). The ability of spammers to forge email headers
often complicates the spam control efforts and makes it hard to locate exact spammers and their location. Also
proven that in today’s world Compromised systems are basically used for anti-social activities. The main goal is
to identify and cleaning compromised systems in the network which are used for spreading malware, spamming
etc. The exact nature of the action varies with the domain email worm authors may try to have the target run an
executable attachment; spyware authors may want to direct the target to a specific web site for a drive-by
download; spammers may want to have the target visit their web site or that of an affiliate. We will refer to
email worm authors, spyware authors, and spammers using the generic term “adversary” since they share this
common goal. In each case, the goal can be accomplished by sending out bulk email (spam ) to potential targets.
Improved spam will come from zombie machines. At first blush, this isn't terribly original, but the difference is
in how the zombies are used. A zombie machine is not just a throwaway resource, a launching pad for DDoS
attacks and spam; a zombie contains a wealth of data.
II. Existing System
In the existing system periodic counting the number of spam messages is used i.e., checking out how
much data is being attained in the form of spam is counted but it is not suitable for aggregate large scale spam
view . Identifying spam messages had became significant challenge for the system administrator to sort out the
solution and the main drawbacks is that sequential detection problem in which it mainly deals when many
process is executing continuously the system should withstand in such a way that stability should be maintained
but it is impossible in this system. Here AutoRE that identifies botnet host by generating botnet spam signatures
from Email. AutoRE is motivated in part by the recent success of signature based worm and virus detection
systems. These trends for evading existing detection systems suggest that we need to take a holistic view of
various mechanisms and explore the invariable attack features in order to get an upper hand in the spam arms
race.
III. Proposed System
The proposed system avoids the main limitations of the existing systems. This system mainly intends to
develop an effective spam zombie detection system.
Monitoring The Spread Of Active Worms In Internet
www.iosrjournals.org 53 | Page
Figure 1. System Architecture
The systems which is used to sense the spam mails i.e. many copies of same mail is send to other
systems. The outgoing messages are arrived in SPOT detection .Inside the SPOT there are three blocks Capture
IP, Spam Filter, Detection of Spam. Capture IP of the system is done then next the system mails are applied to
the spam filter process. Inside the spam filter mail contents are filtered. Next is arriving of detection of spam in
which filtered mail are classified either spam or not spam .Then the result of the spam is displayed .Here
particular system of the spam comes under compromised machines otherwise remaining mails comes under
uncompromised machines.
Next is the process to compare SPOT. Here two different technique are used first is CT (count
threshold) and another is PT. CT is fixed length of spam mail where monitor process is enhanced. If each mail
is greater than or equal to the threshold values then mails are spam. And in case of PT it has two blocks
minimum message threshold and maximum message threshold. And in compute it handles count of total
messages and count of spam mail. These counting values are checked. If it is greater , then this mail are spam
mail.
A. NETWORK AND TOPOLOGY INVENTION
In the first phase, Network topology deals about arrangements of elements such as nodes and links of a
computer. Then the node information and IP address is received with the help of network administrator. Once
the node information is received , then network is configured based on certain rules and regulation. Finally after
configuring the topology , Network topology is innovated.
B.SPAM ZOMBIES DETECTION MACHINE CREATION
Here in this module the main goal is to create detection machine. Messages generated are send to the
spam zombies detection system. Then here an random variable is initiated which randomly generates key. Then
check the value for exceeding the range. If it is exceed then it is said to be Zombies. Else the machine is normal
which means it is not involved in any malware activity.
C.SPOT DETECTION AND ANALYSIS
SPOT examines the user specified boundary values. Boundary is the user defined threshold where user
specifies the limits. Then Random variables arrives along with the message generated from the nodes. Both the
above parameter Boundary values and random variables are send to Sequential Probability Ratio Test. Then
finally false positive and negative is calculated and analysed. These false positive and negative are error rates by
which the actual system can be found out whether it is compromised or not.
D.SPAM COUNT AND ANALYSIS
Here in spam count based detection analysis enhances how to count spam and detect it such that the
resultant will be compromised. User had to detect the threshold value as T. Cs specifies the maximum number
of spam message received from normal machine. If n exceeds Cs then it is compromised machine else it is not
compromised system.
Monitoring The Spread Of Active Worms In Internet
www.iosrjournals.org 54 | Page
E. SPAM PERCENTAGE BASED DETECTION ANALYSIS
Here we need to fix the threshold value T as in case of count analysis. Let N be total number of spam
messages and Ca is minimum number of spam messages. If value of N<Ca and N>P then it implies that it is
compromised system.
F. EVALUATION OF DYNAMIC IP ADDRESS
The main goal is to find and analysis the change of IP address. Since hackers used to change IP address
dynamically so that it becomes very tough job to find it. Received messages are send to spam detection
machine. Detection message also get the IP address of sending message along with the message. Then checking
the parameter values of CT and PT with user specified threshold value. If range of CT and PT is greater then T,
it is compromised machine else it is reported as normal machines.
IV. Spot Progression
This SPOT is considered to be best and important part in the detection system. This SPOT works on
SPRT(Sequential Probability Ratio Test) i.e., it is the probability of finding sequential spam detection process.
SPRT has false positive and false negative error rates. False positive is the one which doesn’t consists of spam
and false negative is the one which consists of spam . Performance of SPOT is based on number and percentage
of spam messages. SPOT minimizes the expected number of observation needed to reach decision among all
the sequential and non sequential statistical test with no greater error rates .
V. Spammers activities blocking
SPOT identify the spam message , analyze the ip address of senders machine. After analyzing the ip
address, messages are send to the Network Administrator in order to check the activities such as whether it
exceeds the user defined threshold value. If the resultant activity seems to be abnormal condition , it is blocked .
Otherwise process continues.
VI. Results
Thus the system is properly detected and analyzed using various techniques mentioned above. An
effective and efficient system in automatically detecting compromised machines in the network is achieved
successfully. Operation workload is very minimum because using the CT and PT techniques. It effectively
identifies any machine sending a single spam message as a compromised machine if a machine sent one
outgoing message caring a virus / worms attachment.
.
Monitoring The Spread Of Active Worms In Internet
www.iosrjournals.org 55 | Page
Figure 2.Hacker and spam victim relationship
Hence using malware scanner and SPOT the system had traced out and also analyzed which system is infected
and which is not compromised systems.
VII. Conclusion
Once the parameters are learned by the spammers, they can send spam messages below the configured
threshold parameters to evade the detection algorithms One possible countermeasure is to configure the
algorithms with small threshold values, which helps reduce the spam sending rate of spammers from
compromised machines, and therefore, the financial gains of spammers. Spammers can also try to evade PT by
sending meaningless “nonspam” messages. Similarly, user feedback can be used to improve the spam detection
rate of spam filters to defeat this type of evasions.
More effective spam can be sent by using malware on zombie machines to mine data from email
corpora. This allows spam to be sent that automatically mimics legitimate email sent by the real owners of the
zombie machines, and our proof-of-concept implementation demonstrates that the result can be convincing even
to seasoned users. While this more effective spam has not, to our knowledge, been seen in the wild, there are
defensive steps that can be taken now to limit its impact when this spam makes its debut.
As future work we will cross validate the findings using other spam archives; we will also develop more
systematic approaches to investigating the inconsistency in spam delivery paths, in addition to the network-level
path consistency .Filtering the zombies before the scanner using SPOT.
References
[1] J.S.Bhatia, R.K.Sehgal and Sanjeev Kumar, “Botnet Command detection using Virtual Honeypot,” International journal of Network
Security & its applications(IJNSA), Vol.3, No.5, Sep 2011.
[2] Z. Chen, C. Chen, and C. Ji, “Understanding Localized-Scanning Worms,” Proc. IEEE Int’l Performance, Computing, and Comm.
Conf. (IPCCC ’07), 2007.
[3] Z. Duan, Y. Dong, and K. Gopalan, “DMTP: Controlling Spam through Message Delivery Differentiation,” Computer Networks, vol.
51, pp. 2616-2630, July 2007.
[4] A. Ramachandran and N. Feamster, “Understanding the Network-Level Behaviour of Spammers,” Proc. ACM SIGCOMM, pp. 291-
302, Sept. 2006.
[5] F. Sanchez, Z. Duan, and Y. Dong, “Understanding Forgery Properties of Spam Delivery Paths,” Proc. Seventh Ann. Collaboration,
Electronic Messaging, Anti-Abuse and Spam Conf. (CEAS ’10), July 2010.
[6] Y.Xie, Fang Yu, kannan Achan, Rina Panigrahy, Geoff hulten, Ivan Osipkov,” Spamming botnet signature and characteristics,”
Microsoft Research,2008
[7] Xianonam Zang, Athichart Tangpong, George Kesidis and David J.Miller,” Botnet detection through fine flow classification,” CSE
Dept Technical Report No.CSE11-001, Jan 2011.

More Related Content

What's hot

Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri
 
A malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learningA malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learningjaigera
 
An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...UltraUploader
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedDryden Geary
 
Procuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the NetworkProcuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the NetworkIOSR Journals
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
Network monotoring
Network monotoringNetwork monotoring
Network monotoringProgrammer
 
Metamorphic Malware Analysis and Detection
Metamorphic Malware Analysis and DetectionMetamorphic Malware Analysis and Detection
Metamorphic Malware Analysis and DetectionGrijesh Chauhan
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniquesiosrjce
 
A feature selection and evaluation scheme for computer virus detection
A feature selection and evaluation scheme for computer virus detectionA feature selection and evaluation scheme for computer virus detection
A feature selection and evaluation scheme for computer virus detectionUltraUploader
 
Paper id 312201513
Paper id 312201513Paper id 312201513
Paper id 312201513IJRAT
 
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONPDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONIJNSA Journal
 
Auto sign an automatic signature generator for high-speed malware filtering d...
Auto sign an automatic signature generator for high-speed malware filtering d...Auto sign an automatic signature generator for high-speed malware filtering d...
Auto sign an automatic signature generator for high-speed malware filtering d...UltraUploader
 

What's hot (20)

[IJET-V1I2P2] Authors :Karishma Pandey, Madhura Naik, Junaid Qamar,Mahendra P...
[IJET-V1I2P2] Authors :Karishma Pandey, Madhura Naik, Junaid Qamar,Mahendra P...[IJET-V1I2P2] Authors :Karishma Pandey, Madhura Naik, Junaid Qamar,Mahendra P...
[IJET-V1I2P2] Authors :Karishma Pandey, Madhura Naik, Junaid Qamar,Mahendra P...
 
Banner grabbing
Banner grabbingBanner grabbing
Banner grabbing
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
A malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learningA malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learning
 
An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklisted
 
Antimalware
AntimalwareAntimalware
Antimalware
 
5
55
5
 
Procuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the NetworkProcuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the Network
 
4
44
4
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
Ananth1
Ananth1Ananth1
Ananth1
 
Network monotoring
Network monotoringNetwork monotoring
Network monotoring
 
Metamorphic Malware Analysis and Detection
Metamorphic Malware Analysis and DetectionMetamorphic Malware Analysis and Detection
Metamorphic Malware Analysis and Detection
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniques
 
A feature selection and evaluation scheme for computer virus detection
A feature selection and evaluation scheme for computer virus detectionA feature selection and evaluation scheme for computer virus detection
A feature selection and evaluation scheme for computer virus detection
 
Paper id 312201513
Paper id 312201513Paper id 312201513
Paper id 312201513
 
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONPDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
 
A44090104
A44090104A44090104
A44090104
 
Auto sign an automatic signature generator for high-speed malware filtering d...
Auto sign an automatic signature generator for high-speed malware filtering d...Auto sign an automatic signature generator for high-speed malware filtering d...
Auto sign an automatic signature generator for high-speed malware filtering d...
 

Viewers also liked

Use of Storage Water in a Hydroelectric System
Use of Storage Water in a Hydroelectric SystemUse of Storage Water in a Hydroelectric System
Use of Storage Water in a Hydroelectric SystemIOSR Journals
 
Chapter 1 biostat
Chapter 1 biostatChapter 1 biostat
Chapter 1 biostatayanle maigag
 
Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...IOSR Journals
 
Modeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning WormsModeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning WormsIOSR Journals
 
Performance Comparison of K-means Codebook Optimization using different Clust...
Performance Comparison of K-means Codebook Optimization using different Clust...Performance Comparison of K-means Codebook Optimization using different Clust...
Performance Comparison of K-means Codebook Optimization using different Clust...IOSR Journals
 
Tracking your emails with mailtracking.com
Tracking your emails with mailtracking.comTracking your emails with mailtracking.com
Tracking your emails with mailtracking.combelieve52
 
No Wonder It's So Hard To Make Money Online!
No Wonder It's So Hard To Make Money Online!No Wonder It's So Hard To Make Money Online!
No Wonder It's So Hard To Make Money Online!believe52
 
EIDER Catalogo verano 2012
EIDER Catalogo verano 2012EIDER Catalogo verano 2012
EIDER Catalogo verano 2012rarbos
 
Threshold Secure B2B Model
Threshold Secure B2B ModelThreshold Secure B2B Model
Threshold Secure B2B ModelIOSR Journals
 
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...IOSR Journals
 

Viewers also liked (20)

G0434045
G0434045G0434045
G0434045
 
Use of Storage Water in a Hydroelectric System
Use of Storage Water in a Hydroelectric SystemUse of Storage Water in a Hydroelectric System
Use of Storage Water in a Hydroelectric System
 
C0151216
C0151216C0151216
C0151216
 
Chapter 1 biostat
Chapter 1 biostatChapter 1 biostat
Chapter 1 biostat
 
Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...
 
Modeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning WormsModeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning Worms
 
Performance Comparison of K-means Codebook Optimization using different Clust...
Performance Comparison of K-means Codebook Optimization using different Clust...Performance Comparison of K-means Codebook Optimization using different Clust...
Performance Comparison of K-means Codebook Optimization using different Clust...
 
Tracking your emails with mailtracking.com
Tracking your emails with mailtracking.comTracking your emails with mailtracking.com
Tracking your emails with mailtracking.com
 
B0320610
B0320610B0320610
B0320610
 
No Wonder It's So Hard To Make Money Online!
No Wonder It's So Hard To Make Money Online!No Wonder It's So Hard To Make Money Online!
No Wonder It's So Hard To Make Money Online!
 
EIDER Catalogo verano 2012
EIDER Catalogo verano 2012EIDER Catalogo verano 2012
EIDER Catalogo verano 2012
 
I0516064
I0516064I0516064
I0516064
 
C0511318
C0511318C0511318
C0511318
 
Threshold Secure B2B Model
Threshold Secure B2B ModelThreshold Secure B2B Model
Threshold Secure B2B Model
 
K0347480 copy
K0347480   copyK0347480   copy
K0347480 copy
 
I0524953
I0524953I0524953
I0524953
 
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
Using Data-Mining Technique for Census Analysis to Give Geo-Spatial Distribut...
 
E0512833
E0512833E0512833
E0512833
 
E0942531
E0942531E0942531
E0942531
 
B0520710
B0520710B0520710
B0520710
 

Similar to Monitoring the Spread of Active Worms in Internet

Detecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBSDetecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBSijsrd.com
 
An email worm vaccine architecture
An email worm vaccine architectureAn email worm vaccine architecture
An email worm vaccine architectureUltraUploader
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1Dhara Shah
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works BriefSunny Geo
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works BriefSunny Geo
 
Intrusion Detection System using Hidden Markov Model (HMM)
Intrusion Detection System using Hidden Markov Model (HMM)Intrusion Detection System using Hidden Markov Model (HMM)
Intrusion Detection System using Hidden Markov Model (HMM)IOSR Journals
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The BotmasterIJERA Editor
 
A Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsA Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsMary Calkins
 
Application of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemApplication of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemAlexander Decker
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkEditor IJCATR
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1Dhara Shah
 
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern RecognitionDo Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern RecognitionBitdefender
 
L018118083.new ramya publication (1)
L018118083.new ramya publication (1)L018118083.new ramya publication (1)
L018118083.new ramya publication (1)IOSR Journals
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkIRJET Journal
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxRineri1
 

Similar to Monitoring the Spread of Active Worms in Internet (20)

Detecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBSDetecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBS
 
An email worm vaccine architecture
An email worm vaccine architectureAn email worm vaccine architecture
An email worm vaccine architecture
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
47
4747
47
 
L017317681
L017317681L017317681
L017317681
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
 
Intrusion Detection System using Hidden Markov Model (HMM)
Intrusion Detection System using Hidden Markov Model (HMM)Intrusion Detection System using Hidden Markov Model (HMM)
Intrusion Detection System using Hidden Markov Model (HMM)
 
B0940509
B0940509B0940509
B0940509
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The Botmaster
 
A Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsA Survey On Intrusion Detection Systems
A Survey On Intrusion Detection Systems
 
Application of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemApplication of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection system
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1
 
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern RecognitionDo Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern Recognition
 
L018118083.new ramya publication (1)
L018118083.new ramya publication (1)L018118083.new ramya publication (1)
L018118083.new ramya publication (1)
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
 
Botnets
BotnetsBotnets
Botnets
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

Monitoring the Spread of Active Worms in Internet

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 5 (Mar. - Apr. 2013), PP 52-55 www.iosrjournals.org www.iosrjournals.org 52 | Page Monitoring the Spread of Active Worms in Internet Mr.V.Senthilkumar , M.Tech IT , Mrs.P.Chitrakala, Asst Prof. Dept. of Information Technology, Hindustan Institute of Technology and Science, Chennai India. Abstract: As far as security is concerned compromised system plays a vital role i.e., system connected with a network and which is used to send spamming, malware, identity theft etc. A System is developed mainly to focus on detection of compromised machines which is already being affected by hacker or cracker and used for anti social activities. We have developed an effective solution for detecting compromised system named “SPOT”. SPOT uses SPRT (Sequence probability ratio test) which has false positive and false positive error rates. This SPOT is an effective and efficient system in detecting compromised machines in the network. To implement a single remote address corresponds to a malicious scanner which works good in internet environments. The main objective are effectively identifying the spam zombies and Denial of Services attack using SPOT without any botnet spam signatures techniques on the network. Keywords- Compromised machines, Malicious scanner, Spam filter, Machine creation, dynamic ip, Spam zombies. I. Introduction As the sub product of electronic mail services, spam became a serious issue in penetrating into any mail system and this types of penetration is mainly used by hackers for stealing confidential data without the knowledge of the user. Generally few hackers use worm which is standalone malware computer program that spreads itself in order to spread to other computers. Compromised systems is generally known to be bots and collection of bots controlled by single entity is known as botnets. This type of system comes into picture due to weak security design of SMTP(Simple Mail Transfer Protocol). The ability of spammers to forge email headers often complicates the spam control efforts and makes it hard to locate exact spammers and their location. Also proven that in today’s world Compromised systems are basically used for anti-social activities. The main goal is to identify and cleaning compromised systems in the network which are used for spreading malware, spamming etc. The exact nature of the action varies with the domain email worm authors may try to have the target run an executable attachment; spyware authors may want to direct the target to a specific web site for a drive-by download; spammers may want to have the target visit their web site or that of an affiliate. We will refer to email worm authors, spyware authors, and spammers using the generic term “adversary” since they share this common goal. In each case, the goal can be accomplished by sending out bulk email (spam ) to potential targets. Improved spam will come from zombie machines. At first blush, this isn't terribly original, but the difference is in how the zombies are used. A zombie machine is not just a throwaway resource, a launching pad for DDoS attacks and spam; a zombie contains a wealth of data. II. Existing System In the existing system periodic counting the number of spam messages is used i.e., checking out how much data is being attained in the form of spam is counted but it is not suitable for aggregate large scale spam view . Identifying spam messages had became significant challenge for the system administrator to sort out the solution and the main drawbacks is that sequential detection problem in which it mainly deals when many process is executing continuously the system should withstand in such a way that stability should be maintained but it is impossible in this system. Here AutoRE that identifies botnet host by generating botnet spam signatures from Email. AutoRE is motivated in part by the recent success of signature based worm and virus detection systems. These trends for evading existing detection systems suggest that we need to take a holistic view of various mechanisms and explore the invariable attack features in order to get an upper hand in the spam arms race. III. Proposed System The proposed system avoids the main limitations of the existing systems. This system mainly intends to develop an effective spam zombie detection system.
  • 2. Monitoring The Spread Of Active Worms In Internet www.iosrjournals.org 53 | Page Figure 1. System Architecture The systems which is used to sense the spam mails i.e. many copies of same mail is send to other systems. The outgoing messages are arrived in SPOT detection .Inside the SPOT there are three blocks Capture IP, Spam Filter, Detection of Spam. Capture IP of the system is done then next the system mails are applied to the spam filter process. Inside the spam filter mail contents are filtered. Next is arriving of detection of spam in which filtered mail are classified either spam or not spam .Then the result of the spam is displayed .Here particular system of the spam comes under compromised machines otherwise remaining mails comes under uncompromised machines. Next is the process to compare SPOT. Here two different technique are used first is CT (count threshold) and another is PT. CT is fixed length of spam mail where monitor process is enhanced. If each mail is greater than or equal to the threshold values then mails are spam. And in case of PT it has two blocks minimum message threshold and maximum message threshold. And in compute it handles count of total messages and count of spam mail. These counting values are checked. If it is greater , then this mail are spam mail. A. NETWORK AND TOPOLOGY INVENTION In the first phase, Network topology deals about arrangements of elements such as nodes and links of a computer. Then the node information and IP address is received with the help of network administrator. Once the node information is received , then network is configured based on certain rules and regulation. Finally after configuring the topology , Network topology is innovated. B.SPAM ZOMBIES DETECTION MACHINE CREATION Here in this module the main goal is to create detection machine. Messages generated are send to the spam zombies detection system. Then here an random variable is initiated which randomly generates key. Then check the value for exceeding the range. If it is exceed then it is said to be Zombies. Else the machine is normal which means it is not involved in any malware activity. C.SPOT DETECTION AND ANALYSIS SPOT examines the user specified boundary values. Boundary is the user defined threshold where user specifies the limits. Then Random variables arrives along with the message generated from the nodes. Both the above parameter Boundary values and random variables are send to Sequential Probability Ratio Test. Then finally false positive and negative is calculated and analysed. These false positive and negative are error rates by which the actual system can be found out whether it is compromised or not. D.SPAM COUNT AND ANALYSIS Here in spam count based detection analysis enhances how to count spam and detect it such that the resultant will be compromised. User had to detect the threshold value as T. Cs specifies the maximum number of spam message received from normal machine. If n exceeds Cs then it is compromised machine else it is not compromised system.
  • 3. Monitoring The Spread Of Active Worms In Internet www.iosrjournals.org 54 | Page E. SPAM PERCENTAGE BASED DETECTION ANALYSIS Here we need to fix the threshold value T as in case of count analysis. Let N be total number of spam messages and Ca is minimum number of spam messages. If value of N<Ca and N>P then it implies that it is compromised system. F. EVALUATION OF DYNAMIC IP ADDRESS The main goal is to find and analysis the change of IP address. Since hackers used to change IP address dynamically so that it becomes very tough job to find it. Received messages are send to spam detection machine. Detection message also get the IP address of sending message along with the message. Then checking the parameter values of CT and PT with user specified threshold value. If range of CT and PT is greater then T, it is compromised machine else it is reported as normal machines. IV. Spot Progression This SPOT is considered to be best and important part in the detection system. This SPOT works on SPRT(Sequential Probability Ratio Test) i.e., it is the probability of finding sequential spam detection process. SPRT has false positive and false negative error rates. False positive is the one which doesn’t consists of spam and false negative is the one which consists of spam . Performance of SPOT is based on number and percentage of spam messages. SPOT minimizes the expected number of observation needed to reach decision among all the sequential and non sequential statistical test with no greater error rates . V. Spammers activities blocking SPOT identify the spam message , analyze the ip address of senders machine. After analyzing the ip address, messages are send to the Network Administrator in order to check the activities such as whether it exceeds the user defined threshold value. If the resultant activity seems to be abnormal condition , it is blocked . Otherwise process continues. VI. Results Thus the system is properly detected and analyzed using various techniques mentioned above. An effective and efficient system in automatically detecting compromised machines in the network is achieved successfully. Operation workload is very minimum because using the CT and PT techniques. It effectively identifies any machine sending a single spam message as a compromised machine if a machine sent one outgoing message caring a virus / worms attachment. .
  • 4. Monitoring The Spread Of Active Worms In Internet www.iosrjournals.org 55 | Page Figure 2.Hacker and spam victim relationship Hence using malware scanner and SPOT the system had traced out and also analyzed which system is infected and which is not compromised systems. VII. Conclusion Once the parameters are learned by the spammers, they can send spam messages below the configured threshold parameters to evade the detection algorithms One possible countermeasure is to configure the algorithms with small threshold values, which helps reduce the spam sending rate of spammers from compromised machines, and therefore, the financial gains of spammers. Spammers can also try to evade PT by sending meaningless “nonspam” messages. Similarly, user feedback can be used to improve the spam detection rate of spam filters to defeat this type of evasions. More effective spam can be sent by using malware on zombie machines to mine data from email corpora. This allows spam to be sent that automatically mimics legitimate email sent by the real owners of the zombie machines, and our proof-of-concept implementation demonstrates that the result can be convincing even to seasoned users. While this more effective spam has not, to our knowledge, been seen in the wild, there are defensive steps that can be taken now to limit its impact when this spam makes its debut. As future work we will cross validate the findings using other spam archives; we will also develop more systematic approaches to investigating the inconsistency in spam delivery paths, in addition to the network-level path consistency .Filtering the zombies before the scanner using SPOT. References [1] J.S.Bhatia, R.K.Sehgal and Sanjeev Kumar, “Botnet Command detection using Virtual Honeypot,” International journal of Network Security & its applications(IJNSA), Vol.3, No.5, Sep 2011. [2] Z. Chen, C. Chen, and C. Ji, “Understanding Localized-Scanning Worms,” Proc. IEEE Int’l Performance, Computing, and Comm. Conf. (IPCCC ’07), 2007. [3] Z. Duan, Y. Dong, and K. Gopalan, “DMTP: Controlling Spam through Message Delivery Differentiation,” Computer Networks, vol. 51, pp. 2616-2630, July 2007. [4] A. Ramachandran and N. Feamster, “Understanding the Network-Level Behaviour of Spammers,” Proc. ACM SIGCOMM, pp. 291- 302, Sept. 2006. [5] F. Sanchez, Z. Duan, and Y. Dong, “Understanding Forgery Properties of Spam Delivery Paths,” Proc. Seventh Ann. Collaboration, Electronic Messaging, Anti-Abuse and Spam Conf. (CEAS ’10), July 2010. [6] Y.Xie, Fang Yu, kannan Achan, Rina Panigrahy, Geoff hulten, Ivan Osipkov,” Spamming botnet signature and characteristics,” Microsoft Research,2008 [7] Xianonam Zang, Athichart Tangpong, George Kesidis and David J.Miller,” Botnet detection through fine flow classification,” CSE Dept Technical Report No.CSE11-001, Jan 2011.