Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Detection of Zombie PCs Based on Email Spam Analysis

Full metadata record
DC Field Value Language
dc.contributor.authorJeong, HyunCheol-
dc.contributor.authorKim, Huy Kang-
dc.contributor.authorLee, Sangjin-
dc.contributor.authorKim, Eunjin-
dc.date.accessioned2021-09-06T19:39:48Z-
dc.date.available2021-09-06T19:39:48Z-
dc.date.created2021-06-18-
dc.date.issued2012-05-25-
dc.identifier.issn1976-7277-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/108396-
dc.description.abstractWhile botnets are used for various malicious activities, it is well known that they are widely used for email spam. Though the spam filtering systems currently in use block IPs that send email spam, simply blocking the IPs of zombie PCs participating in a botnet is not enough to prevent the spamming activities of the botnet because these IPs can easily be changed or manipulated. This IP blocking is also insufficient to prevent crimes other than spamming, as the botnet can be simultaneously used for multiple purposes. For this reason, we propose a system that detects botnets and zombie PCs based on email spam analysis. This study introduces the concept of "group pollution level" - the degree to which a certain spam group is suspected of being a botnet - and "IP pollution level" - the degree to which a certain IP in the spam group is suspected of being a zombie PC. Such concepts are applied in our system that detects botnets and zombie PCs by grouping spam mails based on the URL links or attachments contained, and by assessing the pollution level of each group and each IP address. For empirical testing, we used email spam data collected in an "email spam trap system" Korea's national spam collection system. Our proposed system detected 203 botnets and 18,283 zombie PCs in a day and these zombie PCs sent about 70% of all the spam messages in our analysis. This shows the effectiveness of detecting zombie PCs by email spam analysis, and the possibility of a dramatic reduction in email spam by taking countermeasure against these botnets and zombie PCs.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherKSII-KOR SOC INTERNET INFORMATION-
dc.titleDetection of Zombie PCs Based on Email Spam Analysis-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Huy Kang-
dc.contributor.affiliatedAuthorLee, Sangjin-
dc.identifier.doi10.3837/tiis.2012.05.011-
dc.identifier.scopusid2-s2.0-84861887103-
dc.identifier.wosid000305237200011-
dc.identifier.bibliographicCitationKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.6, no.5, pp.1445 - 1462-
dc.relation.isPartOfKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS-
dc.citation.titleKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS-
dc.citation.volume6-
dc.citation.number5-
dc.citation.startPage1445-
dc.citation.endPage1462-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.identifier.kciidART001751792-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.description.journalRegisteredClassother-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorBot-net-
dc.subject.keywordAuthorinternet worm-
dc.subject.keywordAuthormalware-
dc.subject.keywordAuthoremail spam-
dc.subject.keywordAuthorzombie PC-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher LEE, SANG JIN photo

LEE, SANG JIN
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE