SlideShare une entreprise Scribd logo
1  sur  20
SUSPICIOUS EMAIL
DETECTION
Project Guide : Prof.Shivkumar KM
Project Members: Suraj Kumar
Vinyas Rai
Ankush Banthia
Prasad BT


The aim of this project is to suspect the E-mails which
consist of offensive, anti-social elements and block
them which helps in identifying the suspicious user.



Suspicious email detection is a kind of mailing system
where suspicious users are identified by determining
the keywords used by him/her.



This system is designed such a way that the users can
easily interact with the system with minimum
knowledge to browse the internet.


In the existing system, the mails are sent to the
authenticated users who are intended to be
received.



Suspicious mails cannot be detected.



Offensive users cannot be identified.


The users of this system are compose mails to the other users
who are authenticated already.



In this project, suspicious users are identified by determining
the keywords used by him/her.



All these blocked mails are checked by the administrator and
identify the users who sent such mails.


The suspected mails are blocked or discarded by the
administrator so that they cannot be forwarded.



This is very useful in real-time scenario in which you can
resume the anti-social activities.
The proposed system is developed by using five modules:


Login Module



Registration Module



Administration Module



User Module



Mailing Module
Login Module:


This module is used by administrator and users (who are
authenticated) to login into the secure mail. The login details
of the specified person will be entered and hence can enter
into the secure mail.
Registration Module:


This module is used by the unauthenticated users who are
unregistered. The users must register themselves such that
they can login into the secure mail.
Administration Module:


This module is used by the administrator to perform the
functions like managing the keywords, entering new keywords
and to check out the block list of the discarded mails.
User Module:


This module is used by the users to do operations like
composing mail, checking out the mails in inbox and finally
sending the mails to the authenticated users by attaching a
message.
Mailing Module:


This module is used by the users perform mailing system. The
mailing system consists of composing the mails, sending the
mails and checking out the mails in inbox.


In the administrator module the administrator will be
responsible for blocking the mails and managing the
keywords.



In the client module, different clients who are registered can
compose the mails and can send the mails to the registered
users only.


The development of this project deals with the following
environment :
Software requirements
Hardware requirements



Hardware Requirements:



Pentium processor ---233 MHZ or above
RAM Capacity
---256MB
Hard Disk
---- 20GB









Software Requirements:








Operating System :: Windows NT/2000 or above
Server Side :: JSP with Tomcat Server
Client Side :: HTML ,JavaScript
Services :: JDBC
Database :: Oracle 10g/XE

Integrated Development Environment :: Eclipse 6.0


This helps in finding out anti social elements.



This provides the security to system which adapts it.



This also helps the intelligence bureau, crime branch etc.,



The system provides claim reporting and status enquiry.


Email has been an efficient and popular communication
mechanism as the number of Internet user's increase.



In many security informatics applications it is important to
detect deceptive communication in email.



The proposed work will be helpful for identifying the
suspicious email and also assist the investigators to get the
information in time to take effective actions to reduce the
criminal activities.


According to the emerging changes and new versions, further
work can be done to improve the application Since project is
designed in a flexible software.



This application which is a web based is of standalone
application. This can be implemented on internet by buying
the network space and by creating a website.



The present application when implemented on internet
requires a large database as the backend; this can be done by
using the MySql database as the backend.


Suspicious email detection helps in finding out anti social
elements.



Suspicious email detection provides the security to system
which adapts it.



Suspicious email detection also helps the intelligence bureau,
crime branch etc.,


S. Appavu and R. Rajaram, “Association rule mining for suspicious
email detection: a data mining approach,” in Proc. of the IEEE
International Conference on Intelligence and Security
Informatics,New Jersey, USA, 2007, pp. 316-323.



J. Allanach, H. Tu, S. Singh, P. Willet, and K.
Pattipati,“Detecting,tracking and counteracting terrorist networks
via Hidden Markov Model,” IEEE Aerospace Conference, 2004.



G. P. Zhang “Neural networks for classification: A survey”, IEEE
Transactions On Systems Man and Cybernetics- Part C:
Applications and Reviews, 30(.4) , 2000, pp. 451-462


Thank you

Contenu connexe

Tendances

Employee Management System
Employee Management SystemEmployee Management System
Employee Management Systemvivek shah
 
Online examination system
Online examination systemOnline examination system
Online examination systemRahul Khanwani
 
project
projectproject
projectdnraj
 
Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)shindept123
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 
Online doctor appointment
Online doctor appointmentOnline doctor appointment
Online doctor appointmentAmna Nawazish
 
Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.Manoj Kumar
 
Book Shop Management System
Book Shop Management SystemBook Shop Management System
Book Shop Management SystemMuhammadRifat12
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniquesranjit banshpal
 
Library Management System
Library Management SystemLibrary Management System
Library Management SystemAditya Shah
 
Student result mamagement
Student result mamagementStudent result mamagement
Student result mamagementMickey
 
Online Shopping System Test case Writing
Online Shopping System Test case WritingOnline Shopping System Test case Writing
Online Shopping System Test case Writingchiragmakdiya
 
Project Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptxProject Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptxAjayPatre1
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management SystemMonotheist Sakib
 
A project report on chat application
A project report on chat applicationA project report on chat application
A project report on chat applicationKumar Gaurav
 
Report of Student management system
Report of Student management systemReport of Student management system
Report of Student management system1amitgupta
 

Tendances (20)

Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
project
projectproject
project
 
Online quiz system
Online quiz systemOnline quiz system
Online quiz system
 
Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)
 
POP3 Post Office Protocol
POP3 Post Office ProtocolPOP3 Post Office Protocol
POP3 Post Office Protocol
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
Online doctor appointment
Online doctor appointmentOnline doctor appointment
Online doctor appointment
 
Blog - An Online blogging project
Blog - An Online blogging project Blog - An Online blogging project
Blog - An Online blogging project
 
Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.
 
Book Shop Management System
Book Shop Management SystemBook Shop Management System
Book Shop Management System
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Library Management System
Library Management SystemLibrary Management System
Library Management System
 
Student result mamagement
Student result mamagementStudent result mamagement
Student result mamagement
 
Project on PHP for Complaint management system
Project on PHP for Complaint management systemProject on PHP for Complaint management system
Project on PHP for Complaint management system
 
Online Shopping System Test case Writing
Online Shopping System Test case WritingOnline Shopping System Test case Writing
Online Shopping System Test case Writing
 
Project Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptxProject Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptx
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
 
A project report on chat application
A project report on chat applicationA project report on chat application
A project report on chat application
 
Report of Student management system
Report of Student management systemReport of Student management system
Report of Student management system
 

Similaire à Suspicious Email Detection

Harmfull mail scanning
Harmfull mail scanningHarmfull mail scanning
Harmfull mail scanningSHAMMI KUMAR
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_SynopsisManmeet Sinha
 
Mail tracker mini
Mail tracker miniMail tracker mini
Mail tracker minipendyam
 
Internet mail system java project
Internet mail system java projectInternet mail system java project
Internet mail system java projectTutorial Learners
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkIRJET Journal
 
Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)S3 Infotech IEEE Projects
 
Fake News Detection System django.pptx
Fake News Detection System django.pptxFake News Detection System django.pptx
Fake News Detection System django.pptxAyushKavariya1
 
Senior Year Project
Senior Year ProjectSenior Year Project
Senior Year ProjectAkshay Iyer
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...IRJET Journal
 
Trust management in p2 p systems
Trust management in p2 p systemsTrust management in p2 p systems
Trust management in p2 p systemseSAT Journals
 
Voice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition TechnologyVoice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition TechnologyIRJET Journal
 
11 Project-Online Library Management System
11 Project-Online Library Management System11 Project-Online Library Management System
11 Project-Online Library Management SystemHeather Strinden
 
PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)Joseph Olumide
 
IRJET- An Android Platform for Acquainting Differently Abled Students with Wr...
IRJET- An Android Platform for Acquainting Differently Abled Students with Wr...IRJET- An Android Platform for Acquainting Differently Abled Students with Wr...
IRJET- An Android Platform for Acquainting Differently Abled Students with Wr...IRJET Journal
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkeSAT Publishing House
 

Similaire à Suspicious Email Detection (20)

Harmfull mail scanning
Harmfull mail scanningHarmfull mail scanning
Harmfull mail scanning
 
3.exposure of suspicious email
3.exposure of suspicious email3.exposure of suspicious email
3.exposure of suspicious email
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
Aisha Email System
Aisha Email SystemAisha Email System
Aisha Email System
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_Synopsis
 
Mail tracker mini
Mail tracker miniMail tracker mini
Mail tracker mini
 
Internet mail system java project
Internet mail system java projectInternet mail system java project
Internet mail system java project
 
Classification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social NetworkClassification Methods for Spam Detection in Online Social Network
Classification Methods for Spam Detection in Online Social Network
 
Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)
 
Crime
CrimeCrime
Crime
 
Fake News Detection System django.pptx
Fake News Detection System django.pptxFake News Detection System django.pptx
Fake News Detection System django.pptx
 
Senior Year Project
Senior Year ProjectSenior Year Project
Senior Year Project
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...
 
Trust management in p2 p systems
Trust management in p2 p systemsTrust management in p2 p systems
Trust management in p2 p systems
 
Voice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition TechnologyVoice Based E-Mail System For Blind People Using Speech Recognition Technology
Voice Based E-Mail System For Blind People Using Speech Recognition Technology
 
11 Project-Online Library Management System
11 Project-Online Library Management System11 Project-Online Library Management System
11 Project-Online Library Management System
 
PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)
 
IRJET- An Android Platform for Acquainting Differently Abled Students with Wr...
IRJET- An Android Platform for Acquainting Differently Abled Students with Wr...IRJET- An Android Platform for Acquainting Differently Abled Students with Wr...
IRJET- An Android Platform for Acquainting Differently Abled Students with Wr...
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Suspicious Email Detection

  • 1. SUSPICIOUS EMAIL DETECTION Project Guide : Prof.Shivkumar KM Project Members: Suraj Kumar Vinyas Rai Ankush Banthia Prasad BT
  • 2.  The aim of this project is to suspect the E-mails which consist of offensive, anti-social elements and block them which helps in identifying the suspicious user.  Suspicious email detection is a kind of mailing system where suspicious users are identified by determining the keywords used by him/her.  This system is designed such a way that the users can easily interact with the system with minimum knowledge to browse the internet.
  • 3.  In the existing system, the mails are sent to the authenticated users who are intended to be received.  Suspicious mails cannot be detected.  Offensive users cannot be identified.
  • 4.  The users of this system are compose mails to the other users who are authenticated already.  In this project, suspicious users are identified by determining the keywords used by him/her.  All these blocked mails are checked by the administrator and identify the users who sent such mails.
  • 5.  The suspected mails are blocked or discarded by the administrator so that they cannot be forwarded.  This is very useful in real-time scenario in which you can resume the anti-social activities.
  • 6. The proposed system is developed by using five modules:  Login Module  Registration Module  Administration Module  User Module  Mailing Module
  • 7. Login Module:  This module is used by administrator and users (who are authenticated) to login into the secure mail. The login details of the specified person will be entered and hence can enter into the secure mail.
  • 8. Registration Module:  This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the secure mail.
  • 9. Administration Module:  This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails.
  • 10. User Module:  This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message.
  • 11. Mailing Module:  This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox.
  • 12.  In the administrator module the administrator will be responsible for blocking the mails and managing the keywords.  In the client module, different clients who are registered can compose the mails and can send the mails to the registered users only.
  • 13.  The development of this project deals with the following environment : Software requirements Hardware requirements  Hardware Requirements:  Pentium processor ---233 MHZ or above RAM Capacity ---256MB Hard Disk ---- 20GB    
  • 14.  Software Requirements:       Operating System :: Windows NT/2000 or above Server Side :: JSP with Tomcat Server Client Side :: HTML ,JavaScript Services :: JDBC Database :: Oracle 10g/XE Integrated Development Environment :: Eclipse 6.0
  • 15.  This helps in finding out anti social elements.  This provides the security to system which adapts it.  This also helps the intelligence bureau, crime branch etc.,  The system provides claim reporting and status enquiry.
  • 16.  Email has been an efficient and popular communication mechanism as the number of Internet user's increase.  In many security informatics applications it is important to detect deceptive communication in email.  The proposed work will be helpful for identifying the suspicious email and also assist the investigators to get the information in time to take effective actions to reduce the criminal activities.
  • 17.  According to the emerging changes and new versions, further work can be done to improve the application Since project is designed in a flexible software.  This application which is a web based is of standalone application. This can be implemented on internet by buying the network space and by creating a website.  The present application when implemented on internet requires a large database as the backend; this can be done by using the MySql database as the backend.
  • 18.  Suspicious email detection helps in finding out anti social elements.  Suspicious email detection provides the security to system which adapts it.  Suspicious email detection also helps the intelligence bureau, crime branch etc.,
  • 19.  S. Appavu and R. Rajaram, “Association rule mining for suspicious email detection: a data mining approach,” in Proc. of the IEEE International Conference on Intelligence and Security Informatics,New Jersey, USA, 2007, pp. 316-323.  J. Allanach, H. Tu, S. Singh, P. Willet, and K. Pattipati,“Detecting,tracking and counteracting terrorist networks via Hidden Markov Model,” IEEE Aerospace Conference, 2004.  G. P. Zhang “Neural networks for classification: A survey”, IEEE Transactions On Systems Man and Cybernetics- Part C: Applications and Reviews, 30(.4) , 2000, pp. 451-462