A stepping stone perspective to detection of network threats: Spam detection

ISSN: 22783075
0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

This paper examines one of the novel applications of the concept of stepping stone detection to address network threats known as spam. Previous research has been identified in several applications such as spam, backdoors, intrusions of proxy servers and denial of service attacks as a possible solution that can be solved by using a stepping stone perspective against network threats. In this paper, an experiment has been conducted as to proof two formulas that generated to solve spam problem. Through the control environment and the development of special prototype to detect spam, the result shows that both formulas in detecting spam attack can be used to detect spam successfully. The successful result of the experiment proofs that one of the identified application really works in the real experiment testbed. By producing another solution to detect spam in this research hopefully can contribute another solution to detect a spam problem.

Cite

CITATION STYLE

APA

Omar, M. N., Daud, A. Y., & Ghazali, O. (2019). A stepping stone perspective to detection of network threats: Spam detection. International Journal of Innovative Technology and Exploring Engineering, 8(5s), 126–131.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free