PPT-Detecting Spam Zombies by Monitoring Outgoing Messages

Author : lois-ondreau | Published Date : 2016-03-20

Zhenhai Duan Department of Computer Science Florida State University Outline Motivation and background SPOT algorithm on detecting compromised machines Performance

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Detecting Spam Zombies by Monitoring Out..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Detecting Spam Zombies by Monitoring Outgoing Messages: Transcript


Zhenhai Duan Department of Computer Science Florida State University Outline Motivation and background SPOT algorithm on detecting compromised machines Performance evaluation Summary 2 Motivation. Hongyu . Gao. , . Jun Hu. , . Christo . Wilson. , . Zhichun. . Li. , . Yan . Chen. . and . Ben Y. . Zhao. Northwestern University, US. Northwestern / . Huazhong. Univ. . of . Sci. & Tech, China. and Pitfalls. Al Iverson, Director of Deliverability. AL . IVERSON. Director of . Deliverability for. Email Service Provider ExactTarget. aiverson@exacttarget.com. Active blogger since 2000. See . www.spamresource.com. Hongyu. . Gao. , . Yan . Chen, Kathy Lee, Diana . Palsetia. . and . Alok. . Choudhary. Lab for Internet and Security Technology (LIST). Department of EECS. Northwestern University. Background. 2. Background. Misstear. Spam Filtering. An Artificial Intelligence Showcase. What is Spam. Messages sent indiscriminately to a large number of recipients. We all hate it. Term attributed to a Monty Python skit. Legitimate messages sometimes referred to as “ham. Angel Reyes . Block F. 4/20/11. Image source page: . http://www.canitbesaturdaynow.com. the body of a dead person given the appearance of life, but mute and will-less, by a supernatural force, usually for some evil purpose. . . 1. Sai Koushik Haddunoori. Problem:. E-mail provides a perfect way to send . millions . of advertisements at no cost for the sender, and this unfortunate fact is nowadays extensively exploited by several . Ethan Grefe. December . 13, . 2013. Motivation. Spam email . is constantly cluttering inboxes. Commonly removed using rule based filters. Spam often has . very similar characteristics . This allows . History of the phenomenon. What is a zombie?. Brainstorm. You tell me. . A corpse brought back to life by mystical means (Voodoo, witchcraft) or people in a hypnotized state. Mary Shelley’s Frankenstein. Spatio. -temporal Network-level Automatic Reputation Engine. Shuang. . Hao. , . Nadeem. Ahmed Syed, Nick . Feamster. , Alexander G. Gray, Sven . Krasser. Klevis Luli. SNARE Overview. Sender reputation . By . Gianluca. . Stringhini. , . Christopher . Kruegel. and Giovanni . Vigna. Presented By Awrad Mohammed Ali. 1. Introduction.. The Popular Social Networks.. Data Collection.. Data Analysis.. Spam Bots Analysis.. Objectives. Create an online email account. Create a secure password. Write, open, reply, send, and forward email . messages. Add . contacts to . a contact list. Send and open attachments. Email. Snail Mail. Detecting and Characterizing Social Spam Campaigns Hongyu Gao , Jun Hu , Christo Wilson , Zhichun Li , Yan Chen and Ben Y. Zhao Northwestern University, US Northwestern / Huazhong Univ. The first time you connect to this site you obviously do not know your password. link at the bottom of the screen. This link will take you to the following screen. On this screen, enter your comple A Responsive Anti-Scam Approach. Chalee Vorakulpipat, CISSP, CISA, PMP. National Electronics and Computer Technology Center . (NECTEC). Soontorn. . Sirapaisan. , . Montida. . Pattaranantakul. , . Soontaree.

Download Document

Here is the link to download the presentation.
"Detecting Spam Zombies by Monitoring Outgoing Messages"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents