Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)


Tags: DETECTION, EMAIL, suspicious emails, report suspicious email, reporting suspicious emails, email fraud, report email phishing, scam emails, identity theft, report suspicious emails, report email fraud, email identity theft, identity theft scams, email scams, email phishing, fraud email, fraudulent emails, irs phishing, email fraud reporting, SUSPICIOUS, SUSPICIOUS EMAIL DETECTION,
 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
SUSPICIOUS EMAIL DETECTION
Post: #1


.doc  laxman1.doc (Size: 2.08 MB / Downloads: 227)
SUSPICIOUS EMAIL DETECTION
Abstract

The aim of this project is to suspect the E-mails which consist of offensive, anti-social elements and block them which helps in identifying the suspicious user.
In this project, suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX. , are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails.
This is very useful in real-time scenario in which you can resume the anti-social activities.
It consists 5 modules:
Modules in the Suspicious E-mail detection
• Login Module
• Registration Module
• Administration Module
• User Module
• Mailing Module
1) Login Module:
This module is used by administrator and users (who are authenticated) to login into the secure mail. The login details of the specified person will be entered and hence can enter into the secure mail.
2) Registration Module:
This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the secure mail.
3) Administration Module:
This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails.
4) User Module:
This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message.
5) Mailing Module:
This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox.
1. INTRODUCTION
1.2 About the project

Suspicious email detection is a kind of mailing system where suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb,RDX., are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails.
This is very useful in real-time scenario in which you can resume the anti-social activities.It consists 5 modules:
The users of this system are compose mails to the other users who are authenticated already. If the composed mails consist of the keywords such as bomb, RDX, Terrorist etc. These suspected mails are blocked or discarded by the administrator so that they cannot be forwarded. This system is designed such a way that the users can easily interact with the system with minimum knowledge to browse the internet.
The Second chapter explains the exact Definition of the Problem and evolves out with the Feasibility Study of the product/part.
The Third chapter is System Analysis which deals about the Hardware and Software Specifications, and Software Requirement Specification, under this SRS Formal Description and Module Description.
The Fourth chapter describes the System Design, under this two levels of designs, they are
• High level design (Data design, functional & interface design).
• Low level design (Pseudo code & detail description of functions).
The Fifth chapter fully deals about Testing and Implementation of the whole project.
The Sixth chapter deals the Conclusion and Foreseeable Enhancements of the system.
The Seventh chapter deals about the Bibliography of this Project.
The Eight chapter is the final one which deals about the language used, tools used, Screen layouts and Reports
2. PROBLEM DEFINITION AND FEASIBILITY ANALYSIS
2.1 Definition of the problem

To create or develop a new system first we have to study the prior system, Analysis difficult problems faced by the operator of that system. System Analysis therefore understands such problems and proposes a new system in which the above problems are rectified.
Existing system
In the existing system, the mails are sent to the authenticated users who are intended to be received.
Some defects in existing system are:
• Suspicious mails cannot be detected.
• Offensive users cannot be identified.
Proposed System
In the proposed system the suspicious users are detected and the offensive mails are blocked.
Features of proposed system:
• This helps in finding out anti social elements.
• This provides the security to system which adapts it.
• This also helps the intelligence bureau, crime branch etc.,
Module Description:
The proposed system is developed by using five modules:
• Login Module
• Registration Module
• Administration Module
• User Module
• Mailing Module
Login Module:
This module is used by administrator and users (who are authenticated) to login into the secure mail. The login details of the specified person will be entered and hence can enter into the secure mail.
Registration Module:
This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the secure mail.
Administration Module:
This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails.
User Module:
This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message.
Mailing Module:
This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox.
Module connectivity:
In the administrator module the administrator will be responsible for blocking the mails and managing the keywords.
In the client module, different clients who are registered can compose the mails and can send the mails to the registered users only.
2.2 Feasibility study
It is necessary and prudent to evaluate the feasibility of a project at the earliest possible time. There may be different ways of checking whether a system is feasible or not. The following feasibility studies were performed to gauge the feasibility of the system.
2.2.1 Operational Feasibility
In this test, the operational scope of the system is checked. The system under consideration should have enough operational reach. It is observed that the proposed system is very user friendly and since the system is built with enough help, even persons with little knowledge of windows can find the system very easy.
2.2.2 Technical Feasibility
This test includes a study of function, performance and constraints that may affect the ability to achieve an acceptable system. This test begins with an assessment of the technical viability of the proposed system. One of the main fusers to be accessed is the need of various kinds of resources for the successful implementation for the proposed system.
2.2.3 Economical Feasibility
An evaluation of development cost weighed against the ultimate income or benefit derived from the development of the proposed system is made. Care must be taken that incurred in the development of the proposed of the system should not exceed from the system. The income can be in terms of money or goodwill, since the software brings in both, the system is highly viable.
Post: #2
can any one please tell me the execution process of "suspicious email detection"..
Post: #3
hello sir i need the code & database of SUSPICIOUS EMAIL DETECTION...
please upload it..
thnx in Advance..
Post: #4
please.. tell me how to execute suspicious email detection...
Post: #5
you can refer these page details of"SUSPICIOUS EMAIL DETECTION"


http://project-seminars.com/Thread-suspi...-detection

http://project-seminars.com/Thread-suspi...-detection
Post: #6
pls give me srs for suspicious email detection
i want srs in srs template format its urgent i have to submit on sunday
Post: #7
i want software requirement specification for suspicious email detection
Post: #8
hi friend you can refer this page to get the details on suspicious email detection

http://project-seminars.com/Thread-suspi...-detection
Post: #9
I want the source code of Suspicious E-mail detection project pls notify as soon as possible
my email id is beawriter1[at]gmail.com
Post: #10
where can i get ppt for "suspicious email detection"
Post: #11
I need source code of this
Post: #12
A fraudulent e-mail detection model that uses advanced options. We have extracted several types of features and compared the performance of each category of features with each other in terms of the fraudulent e-mail detection rate. The different types of features are incorporated step by step. The fraudulent e-mail detection has been considered a classification problem and is evaluated using several algorithms of the latest generation and in CCM (Nizamani et al., 2011) which is the authors' previous cluster classification model . Experiments have been performed on various sets of characteristics and different classification methods. The comparison of results is also presented and the evaluation shows that for fraudulent e-mail detection tasks, the feature set is more important regardless of the classification method. The results of the study suggest that the task of fraudulent detection of emails requires the best choice of feature set; While the choice of classification method is less important.

For details on SUSPICIOUS EMAIL DETECTION, use this link:

http://www.slideshare.net/surajkumar9210...1-27594729
 

Marked Categories : email, power point suspicious mail, suspiciou email detection document, technical seminar for suspicious email detection, more information about suspicious email detection, suspicious email detection documentation, email send or not check, suspicious email detection abstract, suspicious email detection java, suspicious email decetion abstract, data leakage detection srs, suspicious email detection rar, email detection, abstract for suspicious email detection, java compose mail, suspiciou email detection, identify suspicious emails, identifying suspicious email, suspicious e mail detection ppt, suspicious e mail detection java project, suspicious email detection,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  detection of tumor in mri using vector quantization segmentation with matlab code Guest 0 243 16-07-2017 12:20 AM
Last Post: Guest
  cusum fault detection matlab code Guest 0 273 16-07-2017 12:20 AM
Last Post: Guest
  blink detection for paralysis patients Guest 0 774 16-07-2017 12:20 AM
Last Post: Guest
  arduino based underground cable fault detection project report Guest 0 267 16-07-2017 12:20 AM
Last Post: Guest
  wavelet based edge detection matlab code Guest 0 262 16-07-2017 12:20 AM
Last Post: Guest
  crack detection using nsct matlab code Guest 0 247 16-07-2017 12:20 AM
Last Post: Guest
  iris movement detection using matlab source code Guest 0 236 16-07-2017 12:20 AM
Last Post: Guest
  implementing voice based email for blinds Guest 0 261 16-07-2017 12:20 AM
Last Post: Guest
  arduino based underground cable fault detection project report Guest 0 270 16-07-2017 12:20 AM
Last Post: Guest
Lightbulb road hump detection Guest 0 191 16-07-2017 12:20 AM
Last Post: Guest
This Page May Contain What is SUSPICIOUS EMAIL DETECTION And Latest Information/News About SUSPICIOUS EMAIL DETECTION,If Not ...Use Search to get more info about SUSPICIOUS EMAIL DETECTION Or Ask Here

Options: