2.
The aim of this project is to suspect the E-mails which
consist of offensive, anti-social elements and block
them which helps in identifying the suspicious user.
Suspicious email detection is a kind of mailing system
where suspicious users are identified by determining
the keywords used by him/her.
This system is designed such a way that the users can
easily interact with the system with minimum
knowledge to browse the internet.
3.
In the existing system, the mails are sent to the
authenticated users who are intended to be
received.
Suspicious mails cannot be detected.
Offensive users cannot be identified.
4.
The users of this system are compose mails to the other users
who are authenticated already.
In this project, suspicious users are identified by determining
the keywords used by him/her.
All these blocked mails are checked by the administrator and
identify the users who sent such mails.
5.
The suspected mails are blocked or discarded by the
administrator so that they cannot be forwarded.
This is very useful in real-time scenario in which you can
resume the anti-social activities.
6. The proposed system is developed by using five modules:
Login Module
Registration Module
Administration Module
User Module
Mailing Module
7. Login Module:
This module is used by administrator and users (who are
authenticated) to login into the secure mail. The login details
of the specified person will be entered and hence can enter
into the secure mail.
8. Registration Module:
This module is used by the unauthenticated users who are
unregistered. The users must register themselves such that
they can login into the secure mail.
9. Administration Module:
This module is used by the administrator to perform the
functions like managing the keywords, entering new keywords
and to check out the block list of the discarded mails.
10. User Module:
This module is used by the users to do operations like
composing mail, checking out the mails in inbox and finally
sending the mails to the authenticated users by attaching a
message.
11. Mailing Module:
This module is used by the users perform mailing system. The
mailing system consists of composing the mails, sending the
mails and checking out the mails in inbox.
12.
In the administrator module the administrator will be
responsible for blocking the mails and managing the
keywords.
In the client module, different clients who are registered can
compose the mails and can send the mails to the registered
users only.
13.
The development of this project deals with the following
environment :
Software requirements
Hardware requirements
Hardware Requirements:
Pentium processor ---233 MHZ or above
RAM Capacity
---256MB
Hard Disk
---- 20GB
14.
Software Requirements:
Operating System :: Windows NT/2000 or above
Server Side :: JSP with Tomcat Server
Client Side :: HTML ,JavaScript
Services :: JDBC
Database :: Oracle 10g/XE
Integrated Development Environment :: Eclipse 6.0
15.
This helps in finding out anti social elements.
This provides the security to system which adapts it.
This also helps the intelligence bureau, crime branch etc.,
The system provides claim reporting and status enquiry.
16.
Email has been an efficient and popular communication
mechanism as the number of Internet user's increase.
In many security informatics applications it is important to
detect deceptive communication in email.
The proposed work will be helpful for identifying the
suspicious email and also assist the investigators to get the
information in time to take effective actions to reduce the
criminal activities.
17.
According to the emerging changes and new versions, further
work can be done to improve the application Since project is
designed in a flexible software.
This application which is a web based is of standalone
application. This can be implemented on internet by buying
the network space and by creating a website.
The present application when implemented on internet
requires a large database as the backend; this can be done by
using the MySql database as the backend.
18.
Suspicious email detection helps in finding out anti social
elements.
Suspicious email detection provides the security to system
which adapts it.
Suspicious email detection also helps the intelligence bureau,
crime branch etc.,
19.
S. Appavu and R. Rajaram, “Association rule mining for suspicious
email detection: a data mining approach,” in Proc. of the IEEE
International Conference on Intelligence and Security
Informatics,New Jersey, USA, 2007, pp. 316-323.
J. Allanach, H. Tu, S. Singh, P. Willet, and K.
Pattipati,“Detecting,tracking and counteracting terrorist networks
via Hidden Markov Model,” IEEE Aerospace Conference, 2004.
G. P. Zhang “Neural networks for classification: A survey”, IEEE
Transactions On Systems Man and Cybernetics- Part C:
Applications and Reviews, 30(.4) , 2000, pp. 451-462