20
SUSPICIOUS EMAIL DETECTION Project Guide : Prof.Shivkumar KM Project Members: Suraj Kumar Vinyas Rai Ankush Banthia Prasad BT

Suspicious Email Detection

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Suspicious Email Detection

SUSPICIOUS EMAIL DETECTION

Project Guide : Prof.Shivkumar KMProject Members: Suraj Kumar

Vinyas RaiAnkush Banthia

Prasad BT

Page 2: Suspicious Email Detection

The aim of this project is to suspect the E-mails which consist of offensive, anti-social elements and block them which helps in identifying the suspicious user.

Suspicious email detection is a kind of mailing system where suspicious users are identified by determining the keywords used by him/her.

This system is designed such a way that the users can easily interact with the system with minimum knowledge to browse the internet.

Introduction

Page 3: Suspicious Email Detection

In the existing system, the mails are sent to the authenticated users who are intended to be received.

Suspicious mails cannot be detected.

Offensive users cannot be identified.

Existing System

Page 4: Suspicious Email Detection

The users of this system are compose mails to the other users who are authenticated already.

In this project, suspicious users are identified by determining the keywords used by him/her.

All these blocked mails are checked by the administrator and identify the users who sent such mails.

Proposed System

Page 5: Suspicious Email Detection

The suspected mails are blocked or discarded by the administrator so that they cannot be forwarded.

This is very useful in real-time scenario in which you can resume the anti-social activities.

Page 6: Suspicious Email Detection

The proposed system is developed by using five modules:

Login Module

Registration Module

Administration Module

User Module

Mailing Module

Methodology

Page 7: Suspicious Email Detection

Login Module:

This module is used by administrator and users (who are authenticated) to login into the secure mail. The login details of the specified person will be entered and hence can enter into the secure mail.

Page 8: Suspicious Email Detection

Registration Module:

This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the secure mail.

Page 9: Suspicious Email Detection

Administration Module:

This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails.

Page 10: Suspicious Email Detection

User Module:

This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message.

Page 11: Suspicious Email Detection

Mailing Module:

This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox.

Page 12: Suspicious Email Detection

In the administrator module the administrator will be responsible for blocking the mails and managing the keywords.

In the client module, different clients who are registered can compose the mails and can send the mails to the registered users only.

Module connectivity

Page 13: Suspicious Email Detection

The development of this project deals with the following environment :

Software requirements Hardware requirements

Hardware Requirements:

Pentium processor ---- 233 MHZ or above RAM Capacity ---- 256MB Hard Disk ---- 20GB

SYSTEM ANALYSIS

Page 14: Suspicious Email Detection

Software Requirements:

Operating System :: Windows NT/2000 or above Server Side :: JSP with Tomcat Server Client Side :: HTML ,JavaScript Services :: JDBC Database :: Oracle 10g/XE

Integrated Development Environment :: Eclipse 6.0

Page 15: Suspicious Email Detection

This helps in finding out anti social elements.

This provides the security to system which adapts it.

This also helps the intelligence bureau, crime branch etc.,

The system provides claim reporting and status enquiry.

Features Of Proposed System

Page 16: Suspicious Email Detection

Email has been an efficient and popular communication mechanism as the number of Internet user's increase.

In many security informatics applications it is important to detect deceptive communication in email.

The proposed work will be helpful for identifying the suspicious email and also assist the investigators to get the information in time to take effective actions to reduce the criminal activities.

CONCLUSION AND FUTURE ENHANCEMENTS

Page 17: Suspicious Email Detection

According to the emerging changes and new versions, further work can be done to improve the application Since project is designed in a flexible software.

This application which is a web based is of standalone application. This can be implemented on internet by buying the network space and by creating a website.

The present application when implemented on internet requires a large database as the backend; this can be done by using the MySql database as the backend.

FUTURE ENHANCEMENTS

Page 18: Suspicious Email Detection

Suspicious email detection helps in finding out anti social elements.

Suspicious email detection provides the security to system which adapts it.

Suspicious email detection also helps the intelligence bureau, crime branch etc.,

Expected Outcome

Page 19: Suspicious Email Detection

S. Appavu and R. Rajaram, “Association rule mining for suspicious email detection: a data mining approach,” in Proc. of the IEEE International Conference on Intelligence and Security Informatics,New Jersey, USA, 2007, pp. 316-323.

J. Allanach, H. Tu, S. Singh, P. Willet, and K. Pattipati,“Detecting,tracking and counteracting terrorist networks via Hidden Markov Model,” IEEE Aerospace Conference, 2004.

G. P. Zhang “Neural networks for classification: A survey”, IEEE Transactions On Systems Man and Cybernetics- Part C: Applications and Reviews, 30(.4) , 2000, pp. 451-462

BIBLIOGRAPHY

Page 20: Suspicious Email Detection

Thank you