SlideShare a Scribd company logo
1 of 16
PROJECT TITLE:-SUSPICIOUS E-MAIL
SCANNING
GUIDED BY:
Mr. Anuj kumar
Mr. Shivnath Gupta
Mr. B. Narasingh Patro
PRESENTED BY:
Shammi kumar
Vikash lal
Rahul kumar
CONTENT
1. Introduction About Project
2. Objective Of Project
3. Module of Project
4. Tools Use In The Project
5. System Architecture
6. Data Flow Diagram
7. E R Diagram
8. Analysis Of The Project
9. Future Scope
INTRODUCTION
Suspicious email detection is a kind of mailing
system where suspicious users are identified
by determining the keywords used by
him/her.The keywords such as malicious code
are found in the mails which are sent by the
user. All these blocked mails are checked by
the administrator and identify the users who
sent such mails.
The aim of this project is to suspect
the E-mails which consist of
offensive, anti-social elements and
block them which help in identifying
the suspicious user.
OBJECTIVE OF THIS PROJECT
MODULES
Modules in the Suspicious E-mail detection
 Login Module
 Registration Module
 Administration Module
 User Module
 Mailing Module
1.LOGIN MODULE
2.REGISTRATION MODULE
This module is used by the unauthenticated users who are
unregistered. The users must register themselves such that
they can login into the secure mail.
This module is used by administrator and users (who are
authenticated) to login into the secure mail. The login
details of the specified person will be entered and hence
can enter into the secure mail.
3.ADMINISTRATION MODULE
4.User Module
This module is used by the administrator to perform the
functions like managing the keywords, entering new
keywords and to check out the block list of the discarded
mails.
This module is used by the users to do operations like
composing mail, checking out the mails in inbox and
finally sending the mails to the authenticated users by
attaching a message
5.MAILING MODULE
This module is used by the users perform mailing system.
The mailing system consists of composing the mails,
sending the mails and checking out the mails in inbox.
SOFTWARE REQUIREMENTS
 Operating System :: Windows 7/8
 Server Side :: JSP with Tomcat Server
 Client Side :: HTML , JavaScript, Core Java
 Services :: JDBC
 Database :: Oracle 10g/XE
HARDWARE REQUIREMENTS
 Pentium processor -------- 233 MHZ or above
 RAM Capacity -------- 256MB
 Hard Disk -------- 20GB
SYSTEMARCHITECTURE
0- LEVEL DFD
abmin user
E-R DIAGRAM
ANALYSIS OF THE PROJECT
ADVANTAGES :-
 This helps in finding out anti social elements.
 This provides the security to system which adapts it.
 This also helps the intelligence bureau, crime branch etc.,
 Insurance premium calculations, for quarterly, half yearly
and annually is completely automated gives us a reliable
environment.
 The system provides claim reporting and status enquiry.
DISADVANTAGES :-
 In the existing system, the mails are sent to the
authenticated users who are intended to be received. Some
defects in existing system are:
 Suspicious mails cannot be detected.
 Offensive users cannot be identified.
Future scope
 In this project, suspicious users are identified
by determining the keywords used by
him/her.The keywords such as mailicious
code are found in the mails which are sent by
the user.All these blocked mails are checked
by the administrator and identify the users
who sent such mails.This is very useful in
real-time scenario in which you can resume
the anti-social activities.
THANK YOU

More Related Content

What's hot

miniproject.ppt.pptx
miniproject.ppt.pptxminiproject.ppt.pptx
miniproject.ppt.pptxAnush90
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 
Android Library Management System
Android Library Management SystemAndroid Library Management System
Android Library Management Systemshafaet karim
 
online library management system
online library management systemonline library management system
online library management systemVirani Sagar
 
Bank management system
Bank management systemBank management system
Bank management systemMahmudul Hasan
 
Library Management System in c++
Library Management System in c++Library Management System in c++
Library Management System in c++vikram mahendra
 
Hospital Management System Project
Hospital Management System ProjectHospital Management System Project
Hospital Management System ProjectSanjit Yadav
 
Banking Management System Project
Banking Management System ProjectBanking Management System Project
Banking Management System ProjectChaudhry Sajid
 
Library Management Project Presentation
Library Management Project PresentationLibrary Management Project Presentation
Library Management Project PresentationSanket Kudalkar
 
Suspicious Email Detection
Suspicious Email DetectionSuspicious Email Detection
Suspicious Email DetectionSuraj Kumar
 
Library management system synopsis
Library management system synopsisLibrary management system synopsis
Library management system synopsisShubham Upadhyay
 
Library_Management_System_Mini_Project_R (1).pdf
Library_Management_System_Mini_Project_R (1).pdfLibrary_Management_System_Mini_Project_R (1).pdf
Library_Management_System_Mini_Project_R (1).pdfVimalKumar242859
 
Library management system_synopsis
Library management system_synopsisLibrary management system_synopsis
Library management system_synopsisShikha Verma
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolRajan Pandey
 

What's hot (20)

miniproject.ppt.pptx
miniproject.ppt.pptxminiproject.ppt.pptx
miniproject.ppt.pptx
 
Rootkits
RootkitsRootkits
Rootkits
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Android Library Management System
Android Library Management SystemAndroid Library Management System
Android Library Management System
 
online library management system
online library management systemonline library management system
online library management system
 
Smtp
SmtpSmtp
Smtp
 
Bank management system
Bank management systemBank management system
Bank management system
 
Library Management System in c++
Library Management System in c++Library Management System in c++
Library Management System in c++
 
Hospital Management System Project
Hospital Management System ProjectHospital Management System Project
Hospital Management System Project
 
Stock Management System Documentation
Stock Management System DocumentationStock Management System Documentation
Stock Management System Documentation
 
Banking Management System Project
Banking Management System ProjectBanking Management System Project
Banking Management System Project
 
Library Management Project Presentation
Library Management Project PresentationLibrary Management Project Presentation
Library Management Project Presentation
 
BANK MANAGEMENT SYSTEM report
BANK MANAGEMENT SYSTEM reportBANK MANAGEMENT SYSTEM report
BANK MANAGEMENT SYSTEM report
 
Suspicious Email Detection
Suspicious Email DetectionSuspicious Email Detection
Suspicious Email Detection
 
Library management system synopsis
Library management system synopsisLibrary management system synopsis
Library management system synopsis
 
Library_Management_System_Mini_Project_R (1).pdf
Library_Management_System_Mini_Project_R (1).pdfLibrary_Management_System_Mini_Project_R (1).pdf
Library_Management_System_Mini_Project_R (1).pdf
 
Library management system_synopsis
Library management system_synopsisLibrary management system_synopsis
Library management system_synopsis
 
Bank Management System
Bank Management SystemBank Management System
Bank Management System
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 

Viewers also liked

Mail server PPT By Mukesh
Mail server PPT By MukeshMail server PPT By Mukesh
Mail server PPT By MukeshMukesh Kumar
 
mail server presentation
mail server presentationmail server presentation
mail server presentationaisadhsa
 
Mail Server Project Report
Mail Server Project ReportMail Server Project Report
Mail Server Project ReportKavita Sharma
 
Online Quiz System Project PPT
Online Quiz System Project PPTOnline Quiz System Project PPT
Online Quiz System Project PPTShanthan Reddy
 

Viewers also liked (6)

Mail server
Mail serverMail server
Mail server
 
Mail server PPT By Mukesh
Mail server PPT By MukeshMail server PPT By Mukesh
Mail server PPT By Mukesh
 
Mail server
Mail serverMail server
Mail server
 
mail server presentation
mail server presentationmail server presentation
mail server presentation
 
Mail Server Project Report
Mail Server Project ReportMail Server Project Report
Mail Server Project Report
 
Online Quiz System Project PPT
Online Quiz System Project PPTOnline Quiz System Project PPT
Online Quiz System Project PPT
 

Similar to Harmfull mail scanning

Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing systemAkshita Pillai
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_SynopsisManmeet Sinha
 
Mail tracker mini
Mail tracker miniMail tracker mini
Mail tracker minipendyam
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netGeorgekutty Francis
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolVinod Gurram
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
 
Java project titles
Java project titlesJava project titles
Java project titlesAshly Liza
 
E-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector MachineE-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector MachineIRJET Journal
 
Suspicious Mail Detection IEEE
Suspicious Mail Detection IEEESuspicious Mail Detection IEEE
Suspicious Mail Detection IEEENikhil Kulkarni
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisHitesh Jangid
 
ProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation reportProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation reportkomkar98230
 
EMAIL SPAM DETECTION USING HYBRID ALGORITHM
EMAIL SPAM DETECTION USING HYBRID ALGORITHMEMAIL SPAM DETECTION USING HYBRID ALGORITHM
EMAIL SPAM DETECTION USING HYBRID ALGORITHMIRJET Journal
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DESIRJET Journal
 

Similar to Harmfull mail scanning (20)

Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
 
3.exposure of suspicious email
3.exposure of suspicious email3.exposure of suspicious email
3.exposure of suspicious email
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_Synopsis
 
Mail tracker mini
Mail tracker miniMail tracker mini
Mail tracker mini
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .net
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 
Java project titles
Java project titlesJava project titles
Java project titles
 
E-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector MachineE-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector Machine
 
Suspicious Mail Detection IEEE
Suspicious Mail Detection IEEESuspicious Mail Detection IEEE
Suspicious Mail Detection IEEE
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Project scheduler doc
Project scheduler docProject scheduler doc
Project scheduler doc
 
Job portal
Job portalJob portal
Job portal
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
library management
library management library management
library management
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester Synopsis
 
ProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation reportProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation report
 
Alumni management system
Alumni management systemAlumni management system
Alumni management system
 
EMAIL SPAM DETECTION USING HYBRID ALGORITHM
EMAIL SPAM DETECTION USING HYBRID ALGORITHMEMAIL SPAM DETECTION USING HYBRID ALGORITHM
EMAIL SPAM DETECTION USING HYBRID ALGORITHM
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 

Recently uploaded

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 

Recently uploaded (20)

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 

Harmfull mail scanning

  • 1. PROJECT TITLE:-SUSPICIOUS E-MAIL SCANNING GUIDED BY: Mr. Anuj kumar Mr. Shivnath Gupta Mr. B. Narasingh Patro PRESENTED BY: Shammi kumar Vikash lal Rahul kumar
  • 2. CONTENT 1. Introduction About Project 2. Objective Of Project 3. Module of Project 4. Tools Use In The Project 5. System Architecture 6. Data Flow Diagram 7. E R Diagram 8. Analysis Of The Project 9. Future Scope
  • 3. INTRODUCTION Suspicious email detection is a kind of mailing system where suspicious users are identified by determining the keywords used by him/her.The keywords such as malicious code are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails.
  • 4. The aim of this project is to suspect the E-mails which consist of offensive, anti-social elements and block them which help in identifying the suspicious user. OBJECTIVE OF THIS PROJECT
  • 5. MODULES Modules in the Suspicious E-mail detection  Login Module  Registration Module  Administration Module  User Module  Mailing Module
  • 6. 1.LOGIN MODULE 2.REGISTRATION MODULE This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the secure mail. This module is used by administrator and users (who are authenticated) to login into the secure mail. The login details of the specified person will be entered and hence can enter into the secure mail.
  • 7. 3.ADMINISTRATION MODULE 4.User Module This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails. This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message
  • 8. 5.MAILING MODULE This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox.
  • 9. SOFTWARE REQUIREMENTS  Operating System :: Windows 7/8  Server Side :: JSP with Tomcat Server  Client Side :: HTML , JavaScript, Core Java  Services :: JDBC  Database :: Oracle 10g/XE
  • 10. HARDWARE REQUIREMENTS  Pentium processor -------- 233 MHZ or above  RAM Capacity -------- 256MB  Hard Disk -------- 20GB
  • 14. ANALYSIS OF THE PROJECT ADVANTAGES :-  This helps in finding out anti social elements.  This provides the security to system which adapts it.  This also helps the intelligence bureau, crime branch etc.,  Insurance premium calculations, for quarterly, half yearly and annually is completely automated gives us a reliable environment.  The system provides claim reporting and status enquiry. DISADVANTAGES :-  In the existing system, the mails are sent to the authenticated users who are intended to be received. Some defects in existing system are:  Suspicious mails cannot be detected.  Offensive users cannot be identified.
  • 15. Future scope  In this project, suspicious users are identified by determining the keywords used by him/her.The keywords such as mailicious code are found in the mails which are sent by the user.All these blocked mails are checked by the administrator and identify the users who sent such mails.This is very useful in real-time scenario in which you can resume the anti-social activities.