This paper examines one of the novel applications of the concept of stepping stone detection to address network threats known as spam. Previous research has been identified in several applications such as spam, backdoors, intrusions of proxy servers and denial of service attacks as a possible solution that can be solved by using a stepping stone perspective against network threats. In this paper, an experiment has been conducted as to proof two formulas that generated to solve spam problem. Through the control environment and the development of special prototype to detect spam, the result shows that both formulas in detecting spam attack can be used to detect spam successfully. The successful result of the experiment proofs that one of the identified application really works in the real experiment testbed. By producing another solution to detect spam in this research hopefully can contribute another solution to detect a spam problem.
CITATION STYLE
Omar, M. N., Daud, A. Y., & Ghazali, O. (2019). A stepping stone perspective to detection of network threats: Spam detection. International Journal of Innovative Technology and Exploring Engineering, 8(5s), 126–131.
Mendeley helps you to discover research relevant for your work.