05-04-2012, 11:41 AM
can any one please tell me the execution process and coding for suspicious email detection...
05-04-2012, 11:41 AM
can any one please tell me the execution process and coding for suspicious email detection...
22-05-2013, 03:07 PM
SUSPICIOUS EMAIL DETECTION
SUSPICIOUS EMAIL.docx (Size: 28.81 KB / Downloads: 17) Abstract The aim of this project is to suspect the E-mails which consist of offensive, anti-social elements and block them which helps in identifying the suspicious user. In this project, suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX. , are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails. This is very useful in real-time scenario in which you can resume the anti-social activities. It consists 5 modules: Modules in the Suspicious E-mail detection • Login Module • Registration Module • Administration Module • User Module • Mailing Module 1) Login Module: This module is used by administrator and users (who are authenticated) to login into the secure mail. The login details of the specified person will be entered and hence can enter into the secure mail. 2) Registration Module: This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the secure mail. 3) Administration Module: This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails. 4) User Module: This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message. 5) Mailing Module: This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox. INTRODUCTION About the project Suspicious email detection is a kind of mailing system where suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb,RDX., are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails. This is very useful in real-time scenario in which you can resume the anti-social activities.It consists 5 modules: The users of this system are compose mails to the other users who are authenticated already. If the composed mails consist of the keywords such as bomb, RDX, Terrorist etc. These suspected mails are blocked or discarded by the administrator so that they cannot be forwarded. This system is designed such a way that the users can easily interact with the system with minimum knowledge to browse the internet. PROBLEM DEFINITION AND FEASIBILITY ANALYSIS Definition of the problem To create or develop a new system first we have to study the prior system, Analysis difficult problems faced by the operator of that system. System Analysis therefore understands such problems and proposes a new system in which the above problems are rectified. Existing system In the existing system, the mails are sent to the authenticated users who are intended to be received. Some defects in existing system are: • Suspicious mails cannot be detected. • Offensive users cannot be identified. Proposed System In the proposed system the suspicious users are detected and the offensive mails are blocked. Features of proposed system: • This helps in finding out anti social elements. • This provides the security to system which adapts it. • This also helps the intelligence bureau, crime branch etc., Technical Feasibility This test includes a study of function, performance and constraints that may affect the ability to achieve an acceptable system. This test begins with an assessment of the technical viability of the proposed system. One of the main fusers to be accessed is the need of various kinds of resources for the successful implementation for the proposed system. Economical Feasibility An evaluation of development cost weighed against the ultimate income or benefit derived from the development of the proposed system is made. Care must be taken that incurred in the development of the proposed of the system should not exceed from the system. The income can be in terms of money or goodwill, since the software brings in both, the system is highly viable. |
|