Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Method of detecting compromised computers in a network. (2012). Method of detecting compromised computers in a network. Retrieved from http://purl.flvc.org/fsu/fd/FSU_uspto_8280968
A method of detecting a compromised machine on a network. The method receives an email message from a machine on the network and classifies it as either spam or non-spam. A probability ratio is then updated, according to whether the message was spam or non-spam, by applying a sequential probability ratio test. If the probability ratio is greater than or equal to a first threshold, then the machine is compromised. If the probability ratio is less than or equal to a second threshold, then the machine is normal. The operations of receiving a message, classifying the message, updating the probability ratio, and indicating the machine is normal or compromised until the probability ratio is greater than or equal to the first threshold are repeated for a plurality of messages. Such repeated operations are performed on each of the messages one at a time, as each of the messages is received.
Method of detecting compromised computers in a network. (2012). Method of detecting compromised computers in a network. Retrieved from http://purl.flvc.org/fsu/fd/FSU_uspto_8280968