SlideShare a Scribd company logo
Presented By:
                      Nikhil Kulkarni


Title: Suspicious E-mail Detection
Area / Specialization: This project is to suspect the E-mails which consist of offensive,
anti-social elements and block them which help in identifying the suspicious user.

Application Domain: Network Security
FrontEnd used:
                     Operating System :: Windows NT/2000 or Above
                     Server Side :: JSP with Tomcat Server
                     Client Side :: HTML ,JavaScript
                     Services :: JDBC
                     Integrated Development Environment ::Netbeans

BackEnd used:
                     Database :

Probable user of System:

                              1.server

                              2.Email ID holder

                              3.Security Provider

MODULES

Modules in the Suspicious E-mail detection

       Login Module
       Registration Module
       Administration Module
       User Module
       Mailing Module
Description:

                   Suspicious email detection is a kind of mailing system where suspicious
users are identified by determining the keywords used by him/her. The keywords such as
bomb, RDX, are found in the mails which are sent by the user. All these blocked mails are
checked by the administrator and identify the users who sent such mails.

More Related Content

PPTX
Suspicious Email Detection
DOC
Summerinternship
PPTX
Harmfull mail scanning
PPTX
Cryptology for security
PDF
Crime file
PPT
Secure crime identification system
DOC
Resume Syed Mansoor Ahmed
DOCX
PROJECT ARRANGED (FINAL)
Suspicious Email Detection
Summerinternship
Harmfull mail scanning
Cryptology for security
Crime file
Secure crime identification system
Resume Syed Mansoor Ahmed
PROJECT ARRANGED (FINAL)

What's hot (17)

PPTX
Voice based email system for physically challenged
DOCX
DOCX
Report police - 6 month training project
PPT
Crime record
PDF
IRJET- V-Mail (Voice based E-Mail Application): Review
PPTX
Blocking misbehaving users in anonymizing network-project ppt*
PPT
literature survey for identity based secure distributed data storage
PDF
Keystroke with Data Leakage Detection for Secure Email Authentication
DOC
Nymble:Blocking misbehaving users in annoying networks(Link)
PDF
Privacy Enhanced Mail (PEM)
PPT
Crime filterd(ppt)
PPT
Image Based Authentication System
PPTX
Crime investigation system
PPTX
dos attacks
PDF
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
PPTX
Sql injection
Voice based email system for physically challenged
Report police - 6 month training project
Crime record
IRJET- V-Mail (Voice based E-Mail Application): Review
Blocking misbehaving users in anonymizing network-project ppt*
literature survey for identity based secure distributed data storage
Keystroke with Data Leakage Detection for Secure Email Authentication
Nymble:Blocking misbehaving users in annoying networks(Link)
Privacy Enhanced Mail (PEM)
Crime filterd(ppt)
Image Based Authentication System
Crime investigation system
dos attacks
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
Sql injection
Ad

Similar to Suspicious Mail Detection IEEE (20)

PPTX
Harmfull mail scanning
PDF
Suspicious email detection project report.pdf
PPT
cyber forensics Email Investigations.ppt
PPT
Email Forensics presentations and quality stuffs
PPT
ch12.ppt which is very good forensics of email
PDF
The Detection of Suspicious Email Based on Decision Tree ...
PDF
Day3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdf
PPTX
E mail forensics
DOCX
3.exposure of suspicious email
PPTX
Email investigation
PPTX
Email Security: The Threat Landscape
PDF
A New Method to Stop Spam Emails in Sender Side
PPTX
Email security
PDF
Cyberscout Corporate Security
PPTX
La seguridad sí importa: Windows Live & IE9
PDF
Cellopoint Email UTM
PDF
Electronic Mail Security (University of Jeddah, Saudi Arabia)
PPTX
Email forensic and social media forienc.pptx
DOCX
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
PDF
A review of spam filtering and measures of antispam
Harmfull mail scanning
Suspicious email detection project report.pdf
cyber forensics Email Investigations.ppt
Email Forensics presentations and quality stuffs
ch12.ppt which is very good forensics of email
The Detection of Suspicious Email Based on Decision Tree ...
Day3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdf
E mail forensics
3.exposure of suspicious email
Email investigation
Email Security: The Threat Landscape
A New Method to Stop Spam Emails in Sender Side
Email security
Cyberscout Corporate Security
La seguridad sí importa: Windows Live & IE9
Cellopoint Email UTM
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Email forensic and social media forienc.pptx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
A review of spam filtering and measures of antispam
Ad

Suspicious Mail Detection IEEE

  • 1. Presented By: Nikhil Kulkarni Title: Suspicious E-mail Detection Area / Specialization: This project is to suspect the E-mails which consist of offensive, anti-social elements and block them which help in identifying the suspicious user. Application Domain: Network Security FrontEnd used:  Operating System :: Windows NT/2000 or Above  Server Side :: JSP with Tomcat Server  Client Side :: HTML ,JavaScript  Services :: JDBC  Integrated Development Environment ::Netbeans BackEnd used:  Database : Probable user of System: 1.server 2.Email ID holder 3.Security Provider MODULES Modules in the Suspicious E-mail detection Login Module Registration Module Administration Module User Module Mailing Module
  • 2. Description: Suspicious email detection is a kind of mailing system where suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX, are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails.