Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Tags: DETECTION, EMAIL, suspicious emails, report suspicious email, reporting suspicious emails, email fraud, report email phishing, scam emails, identity theft, report suspicious emails, report email fraud, email identity theft, identity theft scams, email scams, email phishing, fraud email, fraudulent emails, irs phishing, email fraud reporting, SUSPICIOUS, SUSPICIOUS EMAIL DETECTION,
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
21-03-2011, 10:49 AM
Post: #1
SUSPICIOUS EMAIL DETECTION

.doc  laxman1.doc (Size: 2.08 MB / Downloads: 203)
SUSPICIOUS EMAIL DETECTION
Abstract

The aim of this project is to suspect the E-mails which consist of offensive, anti-social elements and block them which helps in identifying the suspicious user.
In this project, suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX. , are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails.
This is very useful in real-time scenario in which you can resume the anti-social activities.
It consists 5 modules:
Modules in the Suspicious E-mail detection
• Login Module
• Registration Module
• Administration Module
• User Module
• Mailing Module
1) Login Module:
This module is used by administrator and users (who are authenticated) to login into the secure mail. The login details of the specified person will be entered and hence can enter into the secure mail.
2) Registration Module:
This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the secure mail.
3) Administration Module:
This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails.
4) User Module:
This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message.
5) Mailing Module:
This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox.
1. INTRODUCTION
1.2 About the project

Suspicious email detection is a kind of mailing system where suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb,RDX., are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails.
This is very useful in real-time scenario in which you can resume the anti-social activities.It consists 5 modules:
The users of this system are compose mails to the other users who are authenticated already. If the composed mails consist of the keywords such as bomb, RDX, Terrorist etc. These suspected mails are blocked or discarded by the administrator so that they cannot be forwarded. This system is designed such a way that the users can easily interact with the system with minimum knowledge to browse the internet.
The Second chapter explains the exact Definition of the Problem and evolves out with the Feasibility Study of the product/part.
The Third chapter is System Analysis which deals about the Hardware and Software Specifications, and Software Requirement Specification, under this SRS Formal Description and Module Description.
The Fourth chapter describes the System Design, under this two levels of designs, they are
• High level design (Data design, functional & interface design).
• Low level design (Pseudo code & detail description of functions).
The Fifth chapter fully deals about Testing and Implementation of the whole project.
The Sixth chapter deals the Conclusion and Foreseeable Enhancements of the system.
The Seventh chapter deals about the Bibliography of this Project.
The Eight chapter is the final one which deals about the language used, tools used, Screen layouts and Reports
2. PROBLEM DEFINITION AND FEASIBILITY ANALYSIS
2.1 Definition of the problem

To create or develop a new system first we have to study the prior system, Analysis difficult problems faced by the operator of that system. System Analysis therefore understands such problems and proposes a new system in which the above problems are rectified.
Existing system
In the existing system, the mails are sent to the authenticated users who are intended to be received.
Some defects in existing system are:
• Suspicious mails cannot be detected.
• Offensive users cannot be identified.
Proposed System
In the proposed system the suspicious users are detected and the offensive mails are blocked.
Features of proposed system:
• This helps in finding out anti social elements.
• This provides the security to system which adapts it.
• This also helps the intelligence bureau, crime branch etc.,
Module Description:
The proposed system is developed by using five modules:
• Login Module
• Registration Module
• Administration Module
• User Module
• Mailing Module
Login Module:
This module is used by administrator and users (who are authenticated) to login into the secure mail. The login details of the specified person will be entered and hence can enter into the secure mail.
Registration Module:
This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the secure mail.
Administration Module:
This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails.
User Module:
This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message.
Mailing Module:
This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox.
Module connectivity:
In the administrator module the administrator will be responsible for blocking the mails and managing the keywords.
In the client module, different clients who are registered can compose the mails and can send the mails to the registered users only.
2.2 Feasibility study
It is necessary and prudent to evaluate the feasibility of a project at the earliest possible time. There may be different ways of checking whether a system is feasible or not. The following feasibility studies were performed to gauge the feasibility of the system.
2.2.1 Operational Feasibility
In this test, the operational scope of the system is checked. The system under consideration should have enough operational reach. It is observed that the proposed system is very user friendly and since the system is built with enough help, even persons with little knowledge of windows can find the system very easy.
2.2.2 Technical Feasibility
This test includes a study of function, performance and constraints that may affect the ability to achieve an acceptable system. This test begins with an assessment of the technical viability of the proposed system. One of the main fusers to be accessed is the need of various kinds of resources for the successful implementation for the proposed system.
2.2.3 Economical Feasibility
An evaluation of development cost weighed against the ultimate income or benefit derived from the development of the proposed system is made. Care must be taken that incurred in the development of the proposed of the system should not exceed from the system. The income can be in terms of money or goodwill, since the software brings in both, the system is highly viable.
28-06-2011, 03:24 PM
Post: #2
RE: SUSPICIOUS EMAIL DETECTION
can any one please tell me the execution process of "suspicious email detection"......
08-07-2011, 02:40 AM
Post: #3
RE: SUSPICIOUS EMAIL DETECTION
hello sir i need the code & database of SUSPICIOUS EMAIL DETECTION...
please upload it....
thnx in Advance..
09-07-2011, 11:41 PM
Post: #4
RE: SUSPICIOUS EMAIL DETECTION
please................ tell me how to execute suspicious email detection.........

Please Use Search http://seminarprojects.com/search.php wisely To Get More Information About A Seminar Or Project Topic
11-07-2011, 11:48 AM
Post: #5
RE: SUSPICIOUS EMAIL DETECTION
you can refer these page details of"SUSPICIOUS EMAIL DETECTION"


http://www.seminarprojects.com/Thread-su...-detection

http://www.seminarprojects.com/Thread-su...-detection
Rating SUSPICIOUS EMAIL DETECTION Options
Share SUSPICIOUS EMAIL DETECTION To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : email, power point suspicious mail, suspiciou email detection document, technical seminar for suspicious email detection, more information about suspicious email detection, suspicious email detection documentation, email send or not check, suspicious email detection abstract, suspicious email detection java, suspicious email decetion abstract, data leakage detection srs, suspicious email detection rar, email detection, abstract for suspicious email detection, java compose mail, suspiciou email detection, identify suspicious emails, identifying suspicious email, suspicious e mail detection ppt, suspicious e mail detection java project, suspicious email detection,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Bulk Email seminar code 0 95 25-10-2014 10:45 AM
Last Post: seminar code
  network intrusion detection technique subine 0 18 23-10-2014 04:18 PM
Last Post: subine
  Online Shopping with body structure detection project maker 0 17 22-10-2014 03:20 PM
Last Post: project maker
  Image Processing & Face detection using android seminar code 0 14 22-10-2014 02:14 PM
Last Post: seminar code
  Network Sniffing tool with Intrusion Detection and Prevention System project maker 0 22 22-10-2014 09:47 AM
Last Post: project maker
  Email tracking system seminar code 0 21 20-10-2014 12:15 PM
Last Post: seminar code
  Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Developm seminar code 1 100 18-10-2014 08:59 PM
Last Post: saroj khyalia
  biological early brain cancer detection using ann subine 0 25 15-10-2014 04:02 PM
Last Post: subine
  online bulk email system seminar code 0 20 15-10-2014 03:37 PM
Last Post: seminar code
  online bulk email system project maker 0 33 15-10-2014 10:20 AM
Last Post: project maker
This Page May Contain What is SUSPICIOUS EMAIL DETECTION And Latest Information/News About SUSPICIOUS EMAIL DETECTION,If Not ...Use Search to get more info about SUSPICIOUS EMAIL DETECTION Or Ask Here

Options: