Skip to main content

Showing 1–8 of 8 results for author: Dhinakaran, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:1108.1593  [pdf

    cs.CR

    Multilayer Approach to Defend Phishing Attacks

    Authors: Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae Kwang Lee

    Abstract: Spam messes up users inbox, consumes resources and spread attacks like DDoS, MiM, phishing etc. Phishing is a byproduct of email and causes financial loss to users and loss of reputation to financial institutions. In this paper we examine the characteristics of phishing and technology used by Phishers. In order to counter anti-phishing technology, phishers change their mode of operation; therefore… ▽ More

    Submitted 7 August, 2011; originally announced August 2011.

    Comments: 8 Pages, Journal of Internet Technology (JIT) 2010

  2. arXiv:1012.1665  [pdf

    cs.CR cs.NI

    An In-depth Analysis of Spam and Spammers

    Authors: Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae Kwang Lee

    Abstract: Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant increase in spam traffic. Spam messes up user's inbox, consumes network resources and spread worms and viruses. In this paper we study the characteristics of spam and the technology used by spammers. In order to counter ant… ▽ More

    Submitted 7 December, 2010; originally announced December 2010.

    Comments: 14 pages, 8 Figures,5 tables, IJSA Vol 2, No 2, 2008

    Journal ref: International Journal of Security and its Applications,Vol. 2, No. 2, April, 2008

  3. arXiv:1012.0610  [pdf

    cs.CR cs.NI

    Novel Mechanism to Defend DDoS Attacks Caused by Spam

    Authors: Dhinaharan Nagamalai, Cynthia Dhinakaran, Jae-Kwang Lee

    Abstract: Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protection, commercial advertisement free environment are some of the advantages worth to mention. But these mail services are frequent target of hackers and spammers. Distributed Denial of service attacks are becoming more comm… ▽ More

    Submitted 2 December, 2010; originally announced December 2010.

    Comments: 14 Pages, 6 Figures, IJSA Vol 1, No 2,July 2007

    Journal ref: IJSA Vol 1, No 2,July 2007

  4. Bayesian Based Comment Spam Defending Tool

    Authors: Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae Kwang Lee

    Abstract: Spam messes up user's inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or comment spam.It is done by posting comments or flooding spams to the services such as blogs, forums,news,email archives and guestbooks. Blog spams generally appears on guestbooks or comment pages where spammers fill a comment b… ▽ More

    Submitted 14 November, 2010; originally announced November 2010.

    Comments: 14 Pages,4 Figures, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010

  5. Characterizing Spam traffic and Spammers

    Authors: Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae Kwang Lee

    Abstract: There is a tremendous increase in spam traffic these days. Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread worms and viruses. Our goal is to present a definite figure about the characteristics of spam and spammers. Since spammers change their mode of operation to counter anti spam technology,continues evaluation of the characteristics of spam and s… ▽ More

    Submitted 3 November, 2010; originally announced November 2010.

    Comments: 6 pages, 4 Figures, ICCIT 2007, IEEE CS

  6. An Empirical Study of Spam and Spam Vulnerable email Accounts

    Authors: Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae Kwang Lee

    Abstract: Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. Our goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help us to enhance the existing technology to combat spam effectively. We collected 400 thousand spam mails from a spam trap set up in a corporate mail server for a… ▽ More

    Submitted 2 November, 2010; originally announced November 2010.

    Comments: 6 pages, 5 Figures, FGCN 2007, IEEE CS

  7. "Reminder: please update your details": Phishing Trends

    Authors: Cynthia Dhinakaran, Jae Kwang lee, Dhinaharan Nagamalai

    Abstract: Spam messes up users inbox, consumes resources and spread attacks like DDoS, MiM, Phishing etc., Phishing is a byproduct of email and causes financial loss to users and loss of reputation to financial institutions. In this paper we study the characteristics of phishing and technology used by phishers. In order to counter anti phishing technology, phishers change their mode of operation; therefore… ▽ More

    Submitted 13 October, 2010; originally announced October 2010.

    Comments: 6 pages, 6 Figures, NETCOM 2009, IEEE CS

  8. Multi Layer Approach to Defend DDoS Attacks Caused by Spam

    Authors: Dhinaharan Nagamalai, Cynthia Dhinakaran, Jae Kwang Lee

    Abstract: Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protection, commercial advertisement free environment are some of the advantages worth to mention. But these mail services are frequent target of hackers and spammers. Distributed Denial of service attacks are becoming more comm… ▽ More

    Submitted 7 October, 2010; originally announced October 2010.

    Comments: 6 pages,5 figures,MUE 2007, IEEE CS

    Journal ref: MUE 2007, IEEE CS