38 research outputs found
An Empirical Study of Spam and Spam Vulnerable email Accounts
Spam messages muddle up users inbox, consume network resources, and build up
DDoS attacks, spread malware. Our goal is to present a definite figure about
the characteristics of spam and spam vulnerable email accounts. These
evaluations help us to enhance the existing technology to combat spam
effectively. We collected 400 thousand spam mails from a spam trap set up in a
corporate mail server for a period of 14 months form January 2006 to February
2007. Spammers use common techniques to spam end users regardless of corporate
server and public mail server. So we believe that our spam collection is a
sample of world wide spam traffic. Studying the characteristics of this sample
helps us to better understand the features of spam and spam vulnerable e-mail
accounts. We believe that this analysis is highly useful to develop more
efficient anti spam techniques. In our analysis we classified spam based on
attachment and contents. According to our study the four years old heavy users
email accounts attract more spam than four years oldlight users mail accounts.
The 14 months old relatively new email accounts don't receive spam. In some
special cases like DDoS attacks, the new email accounts receive spam. During
DDoS attack 14 months old heavy users email accounts have attracted more number
of spam than 14 months old light users mail accounts.Comment: 6 pages, 5 Figures, FGCN 2007, IEEE C
Design & Deploy Web 2.0 enable services over Next Generation Network Platform
The Next Generation Networks (NGN) aims to integrate for IP-based telecom
infrastructures and provide most advance & high speed emerging value added
services. NGN capable to provide higher innovative services, these services
will able to integrate communication and Web service into a single platform. IP
Multimedia Subsystem, a NGN leading technology, enables a variety of
NGN-compliant communications services to interoperate while being accessed
through different kinds of access networks, preferably broadband. IMS-NGN
services essential by both consumer and corporate users are by now used to
access services, even communications services through the web and web-based
communities and social networks, It is key for success of IMS-based services to
be provided with efficient web access, so users can benefit from those new
services by using web-based applications and user interfaces, not only NGN-IMS
User Equipments and SIP protocol. Many Service are under planning which
provided only under convergence of IMS & Web 2.0. Convergence between Web 2.0
and NGN-IMS creates and serves new invented innovative, entertainment and
information appealing as well as user centric services and applications. These
services merge features from WWW and Communication worlds. On the one hand,
interactivity, ubiquity, social orientation, user participation and content
generation, etc. are relevant characteristics coming from Web 2.0 services.
Parallel IMS enables services including multimedia telephony, media sharing
(video-audio), instant messaging with presence and context, online directory,
etc. all of them applicable to mobile, fixed or convergent telecom networks.
With this paper, this paper brings out the benefits of adopting web 2.0
technologies for telecom services. As the services are today mainly driven by
the user's needs, and proposed the concept of unique customizable service
interface
Effective Personalized Web Mining by Utilizing The Most Utilized Data
Looking into the growth of information in the web it is a very tedious
process of getting the exact information the user is looking for. Many search
engines generate user profile related data listing. This paper involves one
such process where the rating is given to the link that the user is clicking
on. Rather than avoiding the uninterested links both interested links and the
uninterested links are listed. But sorted according to the weightings given to
each link by the number of visit made by the particular user and the amount of
time spent on the particular link.Comment: 9 pages, journal pape
"Reminder: please update your details": Phishing Trends
Spam messes up users inbox, consumes resources and spread attacks like DDoS,
MiM, Phishing etc., Phishing is a byproduct of email and causes financial loss
to users and loss of reputation to financial institutions. In this paper we
study the characteristics of phishing and technology used by phishers. In order
to counter anti phishing technology, phishers change their mode of operation;
therefore continuous evaluation of phishing helps us to combat phishers
effectively. We have collected seven hundred thousand spam from a corporate
server for a period of 13 months from February 2008 to February 2009. From the
collected date, we identified different kinds of phishing scams and mode of
their operation. Our observation shows that phishers are dynamic and depend
more on social engineering techniques rather than software vulnerabilities. We
believe that this study would be useful to develop more efficient anti phishing
methodologies.Comment: 6 pages, 6 Figures, NETCOM 2009, IEEE C
Characterizing Spam traffic and Spammers
There is a tremendous increase in spam traffic these days. Spam messages
muddle up users inbox, consume network resources, and build up DDoS attacks,
spread worms and viruses. Our goal is to present a definite figure about the
characteristics of spam and spammers. Since spammers change their mode of
operation to counter anti spam technology,continues evaluation of the
characteristics of spam and spammers technology has become mandatory. These
evaluations help us to enhance the existing technology to combat spam
effectively. We collected 400 thousand spam mails from a spam trap set up in a
corporate mail server for a period of 14 months form January 2006 to February
2007. Spammers use common techniques to spam end users regardless of corporate
server and public mail server. So we believe that our spam collection is a
sample of world wide spam traffic. Studying the characteristics of this sample
helps us to better understand the features of spam and spammers technology. We
believe that this analysis could be useful to develop more efficient anti spam
techniques.Comment: 6 pages, 4 Figures, ICCIT 2007, IEEE C