Anda di halaman 1dari 12

SUSPICIOUS EMAIL

DETECTION SYSTEM
Project supervisor Project done by
Mr.J.Raju V.Bhadradatta(16TK1A05A7)
G.Balakrushna(16TK1A0533)
K.Hemanth(16TK1A0557)
ABSTRACT

The need for


suspicious email detection
system is increasing rapidly
over the years because of
The aim of this project is to The system is a web
This mailing system the increase usage
suspect the E-mails which application and users are
provides protection from of internet services. And
consist of offensive, anti- needed to have
spam mails which might spam mails have also
social elements and block an internet connection to
create a problem to the increased in the due
them which helps in access this application. It
users. This is very useful in period of time. The
identifying the suspicious uses a three tier
real time scenario. system will evolve as new
user. architecture.
threats immerge and
better security is
embedded into the system
for better reliability.
INTRODUCTION

In this project, suspicious users are


All these blocked mails are checked by
identified by determining the The purpose of the project is to
the administrator to identify the users
keywords used by him/her. The suspect the E-mails which consist of
who sent such mails. This is very
keywords such as Spin the wheel, you offensive, anti-social elements and
useful in real-time scenario in which
won a lottery or click this link to claim block them which help in identifying
you can resume the anti-social
this money etc. are found in the mails the suspicious user.
activities.
which are sent by the user.
LITERATURE SURVEY

SNO TOPIC AUTHOR


1 FILTERING SPAM Geerthik and Anish
A Novel method for spam M.Basavaraju and
2
mail detection Dr.R.Prabhakar
Intelligent world-based Ann Nosier ,Khaled Nagati and
3
Spam filter detection Islam Taj-Eddin
SYSTEM REQUIREMENTS

HARDWARE Processor : RAM : 64MB (or) Hard disk : SOFTWARE


REQUIREMENTS Pentium-III (or) Higher Higher 10GB REQUIREMENTS

Web Technologies : Database :


Technology : Java JDK Version : JDK1.5 Server : Tomcat5.5
HTML, CSS, JavaScript Oracle10g

HTML Development Tool


ADDITIONAL TOOLS Designing : kit : My
Dream weaver Tool Eclipse
DATA FLOW DIAGRAM

• ADMIN

• USER
SYSTEM
ARCHITECTURE
• 1.Login Module
• This module is used by administrator and users
(who are authenticated) to login into the
Colors mail. The login details of the specified
person will be entered and hence can enter
into the Colors mail.
• 2 Registration Module
• This module is used by the unauthenticated
users who are unregistered. The users must
register themselves such that they can login
into the Colors mail.
MODULES • 3.Administration Module
• This module is used by the administrator to
perform the functions like managing the
keywords, entering new keywords and to check
out the block list of the discarded mails.
• 4.Encryption Module
This module is used by the administrator to
perform the functions like encryption of the
words. The encrypted words are sent to the
database and hence managed by the
administrator.
• 5.User Module
• This module is used by the users to do
operations like composing mail, checking out
the mails in inbox and finally sending the mails
to the authenticated users by attaching a
message.
• 6.Mailing Module
• This module is used by the users perform
mailing system. The mailing system consists of
composing the mails, sending the mails and
checking out the mails in inbox.
• CONCLUSION
• Email has been an efficient and popular communication
mechanism as the number of Internet user's increase. In many
security informatics applications it is important to detect
deceptive communication in email. In this application the mails
are classified as suspicious or normal using the key words and
encrypted keywords. The mails containing these keywords and
encrypted keywords are classified as suspicious mails and they
can be blocked and verified by the administrator.
• FUTURE ENHANCEMENTS

CONCLUSION AND Even though the project fulfills the requirements of the present
application there is always scope for further work. According to the
FUTURE emerging changes and new versions, further work can be done to
improve the application Since project is designed in a flexible
ENHANCEMENTS software.
• This application which is a web based is of standalone
application. This can be implemented on internet by buying the
network space and by creating a website.
• The present application when implemented on internet
requires a large database as the backend; this can be done by
using the MySql database as the backend.
• As we use encrypted keyword in this application we can
implement many encrypted algorithms like RSA, DES/3DES,
BLOWFISH, AES, IDEA and many more.
References for the project development were taken from the following books and web sites
10.1 BOOKS REFERED
10.1.1 HTML
Holzner, HTML Black Book
Larne Pekowsley, JAVA Server Pages
10.1.2 JAVA TECHNOLOGIES
Larne Pekowsley, JAVA Server Pages
Nick Todd, JAVA Server Pages

REFERENCES Pistoria, JAVA2 Networking


Scott oaks, JAVA Security
Shadab siddiqui, J2EE Professional
Sierra Bates, Head First EJB
Yehuda Shiran, Java Script Programming
Mastering JAVA Security
JAVA Complete Reference
10.1.3 JDBC
Patel Moss, JAVA Database Programming with JDBC
10.1.4 SOFTWARE ENGINEERING
Roger Pressman, Software Engineering
THANK YOU

Anda mungkin juga menyukai