BY
KAJOL (10261A0524)
HEMANSHU AGARWAl(10261A0516)
under the guidance of
Mrs.P.Poornima
(assistant Professor)
Cse department
Compromised machines are one of the key security threats which often
leads to attacks such as spamming,spreading malware , DDos and identity
theft.
These machines which are involved in the spamming activities, called as
spam zombies are detected by using spam zombie detection system named
SPOT.
SPOT is designed based on powerful statistical tool called sequential
probability ratio test (SPRT).
 In the existing system , compromised machines have been increasingly
used to launch various security attacks.
 Better suited for understanding the aggregate global characteristics of
spamming botnets.
Drawbacks:
‣ Online detection requirement in the network is not supported.
‣ Focus on point of infection.
‣ Analyses the rate at which messages are sent.
 We focus on detection of compromised machines commonly referred as
spam zombies in the network.
 We aim to develop a tool for automatically detecting the compromised
machines in an online manner.
 Detects compromised machines quickly and accurately, with low false
positive and false negative rates.
Fig: Network Model
 H/W SYSTEM CONFIGURATION
Processor - Pentium-III
Speed -1.1 GHz
RAM -256 MB(min)
Hard Disk -20 GB
Floppy Drive -1.44 MB
Keyboard - standard windows keyboard
Mouse -Two or three Button Mouse
Monitor -SVGA (super video graphic array)
 S/W SYSTEM CONFIGURATION
Operating system -windows95/98/2000/XP
Tool - Netbeans
Front end -java , swings, applet
Database (back end) - MySql
Database connectivity –JDBC
 USER INTERFACE MODULE
 SPAM ZOMBIES DETECTION
 COMPROMISED MACHINE DETECTION ALGORITHM
Java Technology
Java Technology is both a programming language and platform.
Working of Java
Java Portability
NETWORKING
TCP is a connection-oriented protocol and reliable.
UDP (User Datagram Protocol) is a connectionless and unreliable
protocol.
•Microsoft Open Database Connectivity (ODBC) is a standard
programming interface for application developers and database systems
providers.
•The beauty of ODBC is that the application can be written to use the same
set of function calls to interface with any data source, regardless of the
database vendor.
•In an effort to set an independent database standard API for Java, Sun
Microsystems developed Java Database Connectivity, or JDBC
• The consistent interface is achieved through the use of “plug-in” database
connectivity modules, or drivers.
•If a database vendor wishes to have JDBC support, he or she must provide
the driver for each platform that the database and Java run on.
STATIC VIEW OF USERLOGIN TABLE
STATIC VIEW OF MAILDETAILS TABLE
Use Case Diagram:
A use case diagram defines the relationship between set of use cases and
actors.
+Submit()
-User name
-password
Login
+send()
-Select Client
-Select File
File process
+Submit()
-Optimise file
client
+detect()
-SPOT
-CT
-DT
Spam Detection
+Monitor()
-Error Message
-Percent
Result
Class Diagram:
•Class Diagram are most commonly found diagrams in modeling Object
Oriented System.
• It shows the set of classes , interfaces, their attributes and their
responsibilities.
User Login Select Client Select Message Send message SPOT detection CT detection DT detection
Failed
Success Client
send text File
Detection1
detection2
Detection3
Sequence Diagram:
The Sequence Diagram is a model that describes how groups of object.
Collaborate in some behavior over a period of time and capturing the behavior
of single use case.
LOGIN
Send Nessage
Monitorin
g
message
Detection
SPOT CT DT
Component Diagram:
Component diagram shows the components and their dependencies
between the system.
Login
Select Client
Send Message
Select File
CT
DT
Detect
SPOT
Activity Diagram:
It illustrates the dynamic nature of the system by modeling the flow of control
from activity to activity
Login Page
Compose Mail Form
Mail List
Filtration of File
Spot Detection:
No Spam
Spot Detection:
Spam File
Performance Test
CT Detection
PT Detection
 After finishing the development of any computer based system
the next complicated time consuming process is system testing
 Software testing is an important element of the software
quality assurance and represents the ultimate review of
specification, design and coding.
Testing Objectives
Testing is a process of validating and verifying that a product:
oMeets the requirements
oWorks as expected
oCan be implemented
oPacifies the needs of customer
A good test case is one that has a high probability of finding an
undiscovered error.
 Source code testing
 Specification testing
 Module level testing
 Unit testing
 Integration testing
 Validation testing
 Recovery testing
 Performance testing
 Black box testing
 Output testing
Testing Methods
Graphical Analysis in the year 2013
The protection of computer based resources that include
hardware, software, data, procedures and people against
unauthorized use or natural disaster is known as system security.
System security can be divided into four related issues:
oSystem security
oData security
oPrivacy
oSystem Integrity
oConfidentiality
Based on various test and survey results which are depicted in the
form of tabular columns below it can be concluded that SPOT
outstands other detection algorithms.
It has been an immense pleasure on working on this project which
comes under Network Security domain which is the need of the hour
in this technology driven world.
Example: Recent survey carried out by Florida State University
[1] Apache Spam Assassin project. http://spamassassin.apache.org/
[2] DBMS by McGraw-Hill International Edition
[3] F. Sanchez and Z. Duan, ” Understanding forgery properties of spam delivery
paths”, in Proceedings of 7th Annual Collaboration, Electronic Messaging, Anti-Abuse
and Spam Conference (CEAS), Redmond, WA, July 2010.
[4] Java by Cengage Learning
[5]Know your enemy: Tracking Botnets. http://www.honeynet.org/papers/bots.
[6]N. Ianelli and A. Hackworth “Botnets as a Vehicle for Online Crime” in Proc. of
First International Conference on Forensic Computer Science, 2006.
[7] Sequential Methods in Statistics. Chapman and Hall, 1986.
[8] Sequential Analysis. John Wiley & Sons, Inc, 1947
[9] Software Engineering by Precise Approach
[10] Software Testing Modeling by Boris Bezier
[11]UML: OOAD CONCEPTS- Gradybooch
Thank You .

spamzombieppt

  • 1.
    BY KAJOL (10261A0524) HEMANSHU AGARWAl(10261A0516) underthe guidance of Mrs.P.Poornima (assistant Professor) Cse department
  • 2.
    Compromised machines areone of the key security threats which often leads to attacks such as spamming,spreading malware , DDos and identity theft. These machines which are involved in the spamming activities, called as spam zombies are detected by using spam zombie detection system named SPOT. SPOT is designed based on powerful statistical tool called sequential probability ratio test (SPRT).
  • 3.
     In theexisting system , compromised machines have been increasingly used to launch various security attacks.  Better suited for understanding the aggregate global characteristics of spamming botnets. Drawbacks: ‣ Online detection requirement in the network is not supported. ‣ Focus on point of infection. ‣ Analyses the rate at which messages are sent.
  • 4.
     We focuson detection of compromised machines commonly referred as spam zombies in the network.  We aim to develop a tool for automatically detecting the compromised machines in an online manner.  Detects compromised machines quickly and accurately, with low false positive and false negative rates. Fig: Network Model
  • 5.
     H/W SYSTEMCONFIGURATION Processor - Pentium-III Speed -1.1 GHz RAM -256 MB(min) Hard Disk -20 GB Floppy Drive -1.44 MB Keyboard - standard windows keyboard Mouse -Two or three Button Mouse Monitor -SVGA (super video graphic array)
  • 6.
     S/W SYSTEMCONFIGURATION Operating system -windows95/98/2000/XP Tool - Netbeans Front end -java , swings, applet Database (back end) - MySql Database connectivity –JDBC
  • 7.
     USER INTERFACEMODULE  SPAM ZOMBIES DETECTION  COMPROMISED MACHINE DETECTION ALGORITHM
  • 8.
    Java Technology Java Technologyis both a programming language and platform. Working of Java
  • 9.
    Java Portability NETWORKING TCP isa connection-oriented protocol and reliable. UDP (User Datagram Protocol) is a connectionless and unreliable protocol.
  • 10.
    •Microsoft Open DatabaseConnectivity (ODBC) is a standard programming interface for application developers and database systems providers. •The beauty of ODBC is that the application can be written to use the same set of function calls to interface with any data source, regardless of the database vendor. •In an effort to set an independent database standard API for Java, Sun Microsystems developed Java Database Connectivity, or JDBC • The consistent interface is achieved through the use of “plug-in” database connectivity modules, or drivers. •If a database vendor wishes to have JDBC support, he or she must provide the driver for each platform that the database and Java run on.
  • 11.
    STATIC VIEW OFUSERLOGIN TABLE STATIC VIEW OF MAILDETAILS TABLE
  • 12.
    Use Case Diagram: Ause case diagram defines the relationship between set of use cases and actors.
  • 13.
    +Submit() -User name -password Login +send() -Select Client -SelectFile File process +Submit() -Optimise file client +detect() -SPOT -CT -DT Spam Detection +Monitor() -Error Message -Percent Result Class Diagram: •Class Diagram are most commonly found diagrams in modeling Object Oriented System. • It shows the set of classes , interfaces, their attributes and their responsibilities.
  • 14.
    User Login SelectClient Select Message Send message SPOT detection CT detection DT detection Failed Success Client send text File Detection1 detection2 Detection3 Sequence Diagram: The Sequence Diagram is a model that describes how groups of object. Collaborate in some behavior over a period of time and capturing the behavior of single use case.
  • 15.
    LOGIN Send Nessage Monitorin g message Detection SPOT CTDT Component Diagram: Component diagram shows the components and their dependencies between the system.
  • 16.
    Login Select Client Send Message SelectFile CT DT Detect SPOT Activity Diagram: It illustrates the dynamic nature of the system by modeling the flow of control from activity to activity
  • 17.
  • 18.
  • 19.
    Filtration of File SpotDetection: No Spam
  • 20.
  • 21.
  • 22.
     After finishingthe development of any computer based system the next complicated time consuming process is system testing  Software testing is an important element of the software quality assurance and represents the ultimate review of specification, design and coding. Testing Objectives Testing is a process of validating and verifying that a product: oMeets the requirements oWorks as expected oCan be implemented oPacifies the needs of customer A good test case is one that has a high probability of finding an undiscovered error.
  • 23.
     Source codetesting  Specification testing  Module level testing  Unit testing  Integration testing  Validation testing  Recovery testing  Performance testing  Black box testing  Output testing Testing Methods Graphical Analysis in the year 2013
  • 24.
    The protection ofcomputer based resources that include hardware, software, data, procedures and people against unauthorized use or natural disaster is known as system security. System security can be divided into four related issues: oSystem security oData security oPrivacy oSystem Integrity oConfidentiality
  • 25.
    Based on varioustest and survey results which are depicted in the form of tabular columns below it can be concluded that SPOT outstands other detection algorithms. It has been an immense pleasure on working on this project which comes under Network Security domain which is the need of the hour in this technology driven world. Example: Recent survey carried out by Florida State University
  • 26.
    [1] Apache SpamAssassin project. http://spamassassin.apache.org/ [2] DBMS by McGraw-Hill International Edition [3] F. Sanchez and Z. Duan, ” Understanding forgery properties of spam delivery paths”, in Proceedings of 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), Redmond, WA, July 2010. [4] Java by Cengage Learning [5]Know your enemy: Tracking Botnets. http://www.honeynet.org/papers/bots. [6]N. Ianelli and A. Hackworth “Botnets as a Vehicle for Online Crime” in Proc. of First International Conference on Forensic Computer Science, 2006. [7] Sequential Methods in Statistics. Chapman and Hall, 1986. [8] Sequential Analysis. John Wiley & Sons, Inc, 1947 [9] Software Engineering by Precise Approach [10] Software Testing Modeling by Boris Bezier [11]UML: OOAD CONCEPTS- Gradybooch
  • 27.