Academia.eduAcademia.edu

Outline

Detecting Spambot as an Antispam Technique for Web Internet BBS

2013

Abstract

Spam which is one of the most popular and also the most relevant topic that needs to be understood in the current scenario. Everyone whether it may be a small child or an old person are using emails everyday all around the world. The scenario which we are seeing is that almost no one is aware or in simple sentence they do not know what actually the spam is and what they will do in their systems. Spam in general means unsolicited or unwanted mails. Botnets are considered one of the main source of the spam. Botnet means the group of software’s called bots and the function of these bots is to run on several compromised computers autonomously and automatically. The main objective of this paper is to detect such a bot or spambots for the Bulletin Board System (BBS). BBS is a computer that is running software that allows users to leave a message and access information of general interest. Originally BBSes were accessed only over a phone line using a modem, but nowadays some BBSes allowed ...

References (7)

  1. Mohammed Fadhil Zamil, Ahmed M. Manasrah, Omar Amir, Sureswaran Ramadass "A BEHAVIOR BASED ALGORITHM TO DETECT SPAM BOTS" National Advanced IPv6 Center, Universiti Sains Malaysia.
  2. Joonmo Hong, Boo Joong Kang, Eul Gyu Im "ADAPTABLE ANTI-SPAM TECHNIQUE FOR THE INTERNET WEB BBS" Division of Computer Science & Engineering, Hanyang University, Seoul, 133-791
  3. R. Qiong, M. Yi, & W. Susilo, "SEFAP: An Email System for Anti-Phishing," ICIS 6th IEEE/ACIS International Conference on Computer and Information Science, pp. 782- 787, 2007.
  4. J. S. Sauver, "Spam Zombies and Inbound Flows to Compromised Customer Systems," AAWG
  5. Z. Zhaosheng, L. Guohan, C. Yan, Z.J. Fu, P. Roberts, and H. Keesook, "Botnet Research Survey," Computer Software and Applications. COMPSAC '08. 32nd Annual IEEE International, pp. 967-972, 2008.
  6. Y. Miao, J. Qiu-Xiang, and M. Fan-Jin, "The Spam Filtering Technology Based on SVM and D-S Theory," Knowledge Discovery and Data Mining, 2008. WKDD. First International Workshop on, pp. 562-565, 2008.
  7. Introduction to the Realtime Blackhole List (RBL). MAPS- Global Secure Systems [website], Nov 28, 2008, Available: http://www.mailabuse.com/wp_introrbl.html.