SUSPICIOUS EMAIL DETECTION
#1

[attachment=10636]
SUSPICIOUS EMAIL DETECTION
Abstract

The aim of this project is to suspect the E-mails which consist of offensive, anti-social elements and block them which helps in identifying the suspicious user.
In this project, suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX. , are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails.
This is very useful in real-time scenario in which you can resume the anti-social activities.
It consists 5 modules:
Modules in the Suspicious E-mail detection
• Login Module
• Registration Module
• Administration Module
• User Module
• Mailing Module
1) Login Module:
This module is used by administrator and users (who are authenticated) to login into the secure mail. The login details of the specified person will be entered and hence can enter into the secure mail.
2) Registration Module:
This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the secure mail.
3) Administration Module:
This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails.
4) User Module:
This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message.
5) Mailing Module:
This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox.
1. INTRODUCTION
1.2 About the project

Suspicious email detection is a kind of mailing system where suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb,RDX., are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails.
This is very useful in real-time scenario in which you can resume the anti-social activities.It consists 5 modules:
The users of this system are compose mails to the other users who are authenticated already. If the composed mails consist of the keywords such as bomb, RDX, Terrorist etc. These suspected mails are blocked or discarded by the administrator so that they cannot be forwarded. This system is designed such a way that the users can easily interact with the system with minimum knowledge to browse the internet.
The Second chapter explains the exact Definition of the Problem and evolves out with the Feasibility Study of the product/part.
The Third chapter is System Analysis which deals about the Hardware and Software Specifications, and Software Requirement Specification, under this SRS Formal Description and Module Description.
The Fourth chapter describes the System Design, under this two levels of designs, they are
• High level design (Data design, functional & interface design).
• Low level design (Pseudo code & detail description of functions).
The Fifth chapter fully deals about Testing and Implementation of the whole project.
The Sixth chapter deals the Conclusion and Foreseeable Enhancements of the system.
The Seventh chapter deals about the Bibliography of this Project.
The Eight chapter is the final one which deals about the language used, tools used, Screen layouts and Reports
2. PROBLEM DEFINITION AND FEASIBILITY ANALYSIS
2.1 Definition of the problem

To create or develop a new system first we have to study the prior system, Analysis difficult problems faced by the operator of that system. System Analysis therefore understands such problems and proposes a new system in which the above problems are rectified.
Existing system
In the existing system, the mails are sent to the authenticated users who are intended to be received.
Some defects in existing system are:
• Suspicious mails cannot be detected.
• Offensive users cannot be identified.
Proposed System
In the proposed system the suspicious users are detected and the offensive mails are blocked.
Features of proposed system:
• This helps in finding out anti social elements.
• This provides the security to system which adapts it.
• This also helps the intelligence bureau, crime branch etc.,
Module Description:
The proposed system is developed by using five modules:
• Login Module
• Registration Module
• Administration Module
• User Module
• Mailing Module
Login Module:
This module is used by administrator and users (who are authenticated) to login into the secure mail. The login details of the specified person will be entered and hence can enter into the secure mail.
Registration Module:
This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the secure mail.
Administration Module:
This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails.
User Module:
This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message.
Mailing Module:
This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox.
Module connectivity:
In the administrator module the administrator will be responsible for blocking the mails and managing the keywords.
In the client module, different clients who are registered can compose the mails and can send the mails to the registered users only.
2.2 Feasibility study
It is necessary and prudent to evaluate the feasibility of a project at the earliest possible time. There may be different ways of checking whether a system is feasible or not. The following feasibility studies were performed to gauge the feasibility of the system.
2.2.1 Operational Feasibility
In this test, the operational scope of the system is checked. The system under consideration should have enough operational reach. It is observed that the proposed system is very user friendly and since the system is built with enough help, even persons with little knowledge of windows can find the system very easy.
2.2.2 Technical Feasibility
This test includes a study of function, performance and constraints that may affect the ability to achieve an acceptable system. This test begins with an assessment of the technical viability of the proposed system. One of the main fusers to be accessed is the need of various kinds of resources for the successful implementation for the proposed system.
2.2.3 Economical Feasibility
An evaluation of development cost weighed against the ultimate income or benefit derived from the development of the proposed system is made. Care must be taken that incurred in the development of the proposed of the system should not exceed from the system. The income can be in terms of money or goodwill, since the software brings in both, the system is highly viable.
Reply
#2
can any one please tell me the execution process of "suspicious email detection"......
Reply
#3
hello sir i need the code & database of SUSPICIOUS EMAIL DETECTION...
please upload it....
thnx in Advance..
Reply
#4
please................ tell me how to execute suspicious email detection.........
Reply
#5
you can refer these page details of"SUSPICIOUS EMAIL DETECTION"


http://studentbank.in/report-suspicious-email-detection

http://studentbank.in/report-suspicious-email-detection
Reply
#6
pls give me srs for suspicious email detection
i want srs in srs template format its urgent i have to submit on sunday
Reply
#7
i want software requirement specification for suspicious email detection
Reply
#8
hi friend you can refer this page to get the details on suspicious email detection

http://studentbank.in/report-suspicious-email-detection
Reply
#9
Dear Sir,
Please I need this project source code.
Reply
#10
To get full information or details of SUSPICIOUS EMAIL DETECTION please have a look on the pages



http://studentbank.in/report-suspicious-email-detection



if you again feel trouble on SUSPICIOUS EMAIL DETECTION please reply in that page and ask specific fields in SUSPICIOUS EMAIL DETECTION
Reply
#11
plz sir send me project on suspicous e-mail detection in java or whatever language u use .. plz send me its urgent for me
Reply
#12
Suspicious e-mail Detection Java Project is a web based project developed using java. The main aim of this project is to suspect the emails which consists of offensive, anti social elements and blocks them from being sent and identifies the suspicious user.

Now a days it had became common on getting suspicious mails and there are many fraud cases lauched in past few years. This problem has became a serious issue for internet giants like yahoo gmail and hot mail also. So researches are going on to deal this problem more efficetively. In this paper we propose a system which can help in research to solve this problem. This system works on detecting keywords such as bomb, RDX , lottery ..etc. Admin will have option to check mails of this spam mails and restrict them and find out from which IP it was sent. This application will be useful in real time scenario for finding suspicious mails.

http://studentbank.in/report-source-code...#pid174514

http://studentbank.in/report-source-code...#pid174514
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: http www seminarprojects org t suspici detection,
Popular Searches: suspicious email detection java project source code, suspicious email detection project design modules, suspicious email detection uml diagram, mini projects for exposure of suspicious emails, er diagram for suspicious email detection, pendrive booteableuspicious email detection, more information about suspicious email detection,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DATA LEAKAGE DETECTION project topics 16 13,057 31-07-2015, 02:59 PM
Last Post: seminar report asees
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 2,953 26-05-2015, 03:04 PM
Last Post: seminar report asees
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 4,681 27-01-2015, 12:09 AM
Last Post: Guest
  Credit Card Fraud Detection Using Hidden Markov Models alagaddonjuan 28 20,565 04-09-2014, 11:31 PM
Last Post: Charlescic
  Digital Image Processing Techniques for the Detection and Removal of Cracks in Digiti electronics seminars 4 4,861 22-07-2013, 09:37 PM
Last Post: Guest
  OBSTACLE DETECTION AND AVOIDANCE ROBOT seminar surveyer 5 7,537 24-06-2013, 10:44 AM
Last Post: computer topic
  Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet electronics seminars 6 3,223 26-04-2013, 01:58 PM
Last Post: Guest
  Intelligent system for Gas, Human detection and Temperature Monitor control using GSM seminar surveyer 3 3,441 17-04-2013, 11:37 PM
Last Post: [email protected]
  An email filter to cut out spam project topics 1 1,651 24-12-2012, 11:36 AM
Last Post: seminar details
  Fuzzy Impulse Noise Detection and Reduction project topics 1 1,841 05-12-2012, 03:58 PM
Last Post: seminar details

Forum Jump: