A STUDY ON SUSPICIOUS EMAIL DETECTION (No of pages: 84)

499.00

Compare Added Add to Wishlist Browse Wishlist
Report Abuse
Categories: , , , ,

Description

INDEX

Chapter no                                      Title                                            Page no

Chapter-1                                   INTRODUCTION                              08

Chapter –2                                  LITERATURE SURVEY                  13

Chapter –3                                 SYSTEM ANALYSIS                         33

Chapter -4                                  SYSTEM REQUIREMENTS             35

Chapter-5                                   SYSTEM DESIGN                                         37

Chapter-6                                    CODING                                              48

Chapter-7                                    SYSTEM TESTING                           57

Chapter-8                                    COMPANY PROFILE                       71

Chapter -9 CONCLUSION AND FUTURE ENHANCEMENTS       83

INTRODUCTION

  • SCOPE

In this project, suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX, are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails. This is very useful in real-time scenario in which you can resume the anti-social activities.

1.2     PURPOSE OF THE PROJECT

The purpose of the project is to suspect the E-mails which consist of offensive, anti-social elements and block them which help in identifying the suspicious user.

 

  • OVERVIEW OF PROJECT
  • Login Module
  • Registration Module
  • Administration Module
  • Encryption Module
  • User Module
  • Mailing Module

OBJECTIVES OF THE STUDY:

The aim of this project is to suspect the E-mails which consist of offensive, anti-social elements and block them which help in identifying the suspicious user.

Description

Suspicious email detection is a kind of mailing system where suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX, are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails.

MODULES

Modules in the Suspicious E-mail detection

  • Login Module
  • Registration Module
  • Administration Module
  • User Module
  • Mailing Module
  • Login Module

This module is used by administrator and users (who are authenticated) to login into the secure mail. The login details of the specified person will be entered and hence can enter into the secure mail.

  • Registration Module

This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the secure mail.

  • Administration Module

This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails.

  • User Module

This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message.

  • Mailing Module

This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox.

SCOPE OF THE STUDY:

In this project, suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX, are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails. This is very useful in real-time scenario in which you can resume the anti-social activities.

 

 

PROBLEM STATEMENT:

The problem under consideration is to identify emails that contain suspicious contents indicating future terrorism events. We consider the task of suspicious email detection as a classification task. We start with a training set T ={e1, e2, e3… em} and class labels is Suspicious = {Yes, No}. Each email is given a label. The purpose is to formulate a model that learns from the training set and is able to classify a new email sample as either suspicious or non-suspicious. We cannot deny the importance of email that is a major source of communication among most individuals and organizations, including terrorists and terrorist organizations. From this major source of communication, we can potentially locate evidence of future terrorist events. We propose a methodology to find clues about such events through email communication before those events take place. The proposed system first extracts useful features from the email body. If such features present in a certain combination, the email is marked as suspicious and the evidence of a potential future terrorist event is captured. If some features i.e., keywords are present but not others i.e., suspicious indicators, it may just be an email discussing past events, maybe condemning the events and so on. In the paper, we extracted the features (that are suspicious) along with the context. For example: an email body contains the message text as: “All the true Muslims condemn the terrorist attacks of 9/11.” In the sentence, the keywords “terrorist” and “attack” are used but they do not indicate a future attack due to the presence of another feature “condemn.”

METHODOLOGIES TO BE USED:

Research methodology is a way to systematically solve the research problem. it may be understood as a science of studying how research is done scientifically. So, the research methodology not only talks about the research methods but also considers the logic behind the method used in the context of the research study.

Research Design:

            Descriptive research is used in this study because it will ensure the minimization of bias and maximization of reliability of data collected. The researcher had to use fact and information already available through financial statements of earlier years and analyze these to make critical evaluation of the available material. Hence by making the type of the research conducted to be both Descriptive and Analytical in nature.

Implementation of various tools and techniques will be used in the developmental stage and testing and validation will be checked.

            From the study, the type of data to be collected and the procedure to be used for this purpose were decided.

Data Collection:

The data will be collected from the two main sources. Those are:

  • Primary Source of data
  • Secondary Source of data

  PRIMARY SOURCE 

Primary source includes the data that is collected from the organization and selected respondents.  The required information will be collected in the following ways:

  • Administered a structured questionnaire.
  • On the basis of observation.
  • By interacting with the concerned employees.

Tools used for data collection are as follows

  • Discussions (Unstructured Discussions)
  • Questionnaire (Structured Questionnaire)

 

Unstructured Discussion:

Under this method of data collection; I will personally interview the respondents to gather the information.  The opinions of the respondents will be used as the primary source of information for preparing the study report.

Structured Questionnaire:

It is usually associated with the self-administered tools with items of the closed or fixed alternative type. The respondents will feel greater confidence in the anonymity of questionnaire than in that of any interview.  It places less pressure on the subject of immediate response.  These will be the reasons for choosing questionnaire as one of the tools for data collection.

The questionnaire will consist of two types of questions:

Close-ended questions: The close-ended questions will consist of multiple choices, which offer the respondents with a choice of specific answers.

Open-ended questions: An open-ended question is a question where no choices of answer will be given the respondent and the respondent will be given freedom to respond according to his wish.

SECONDARY SOURCE

Secondary source is that information that will be obtained from those sources other than direct sources and the information is collected through the mentioned ways.

  • Company’s Website.
  • Magazines and Journals.
  • Text books published on Human Resource Management.
  • Websites and Search engines.
  • Other records.
  1. B) SAMPLE SELECTION:

A sample is known as the sub-unit of population which shares the similar features. The number of units in the sample is known as the sample size.

In this study a sample size of 50 will be selected based on the previous studies and other past records.  Here, in this context a sample refers to the employees of the related departments covered by the study.

After the selection of sample, the sampling will be done based on convenient sampling method.

HARDWARE REQUIREMENTS

Processor                                     : Pentium-III (or) Higher

RAM                                            : 64MB (or) Higher

Cache                                           : 512MB

Hard disk                                     : 10GB

 

 

SOFTWARE REQUIREMENTS

 

 

Technology                                  : Java and J2EE

Web Technologies                        : HTML, CSS, JavaScript

Database                                     : Oracle10g

JDK Version                               : JDK1.5

Server                                          : Tomcat5.5

 

ADDITIONAL TOOLS

HTML Designing                      : Dream weaver Tool

Development Tool kit                : My Eclipse

 

 

 

 

CONCLUSION

Email has been an efficient and popular communication mechanism as the number of Internet user’s increase. In many security informatics applications it is important to detect deceptive communication in email.  In this application the mails are classified as suspicious or normal using the key words and encrypted keywords. The mails containing these keywords and encrypted keywords are classified as suspicious mails and they can be blocked and verified by the administrator. The proposed work will be helpful for identifying the suspicious email and also assist the investigators to get the information in time to take effective actions to reduce the criminal activities.

 

 

Reviews

There are no reviews yet.

Be the first to review “A STUDY ON SUSPICIOUS EMAIL DETECTION (No of pages: 84)”

Your email address will not be published.