SlideShare a Scribd company logo
PROJECT TITLE:-SUSPICIOUS E-MAIL
SCANNING
GUIDED BY:
Mr. Anuj kumar
Mr. Shivnath Gupta
Mr. B. Narasingh Patro
PRESENTED BY:
Shammi kumar
Vikash lal
Rahul kumar
CONTENT
1. Introduction About Project
2. Objective Of Project
3. Module of Project
4. Tools Use In The Project
5. System Architecture
6. Data Flow Diagram
7. E R Diagram
8. Analysis Of The Project
9. Future Scope
INTRODUCTION
Suspicious email detection is a kind of mailing
system where suspicious users are identified
by determining the keywords used by
him/her.The keywords such as malicious code
are found in the mails which are sent by the
user. All these blocked mails are checked by
the administrator and identify the users who
sent such mails.
The aim of this project is to suspect
the E-mails which consist of
offensive, anti-social elements and
block them which help in identifying
the suspicious user.
OBJECTIVE OF THIS PROJECT
MODULES
Modules in the Suspicious E-mail detection
 Login Module
 Registration Module
 Administration Module
 User Module
 Mailing Module
1.LOGIN MODULE
2.REGISTRATION MODULE
This module is used by the unauthenticated users who are
unregistered. The users must register themselves such that
they can login into the secure mail.
This module is used by administrator and users (who are
authenticated) to login into the secure mail. The login
details of the specified person will be entered and hence
can enter into the secure mail.
3.ADMINISTRATION MODULE
4.User Module
This module is used by the administrator to perform the
functions like managing the keywords, entering new
keywords and to check out the block list of the discarded
mails.
This module is used by the users to do operations like
composing mail, checking out the mails in inbox and
finally sending the mails to the authenticated users by
attaching a message
5.MAILING MODULE
This module is used by the users perform mailing system.
The mailing system consists of composing the mails,
sending the mails and checking out the mails in inbox.
SOFTWARE REQUIREMENTS
 Operating System :: Windows 7/8
 Server Side :: JSP with Tomcat Server
 Client Side :: HTML , JavaScript, Core Java
 Services :: JDBC
 Database :: Oracle 10g/XE
HARDWARE REQUIREMENTS
 Pentium processor -------- 233 MHZ or above
 RAM Capacity -------- 256MB
 Hard Disk -------- 20GB
SYSTEMARCHITECTURE
0- LEVEL DFD
abmin user
E-R DIAGRAM
ANALYSIS OF THE PROJECT
ADVANTAGES :-
 This helps in finding out anti social elements.
 This provides the security to system which adapts it.
 This also helps the intelligence bureau, crime branch etc.,
 Insurance premium calculations, for quarterly, half yearly
and annually is completely automated gives us a reliable
environment.
 The system provides claim reporting and status enquiry.
DISADVANTAGES :-
 In the existing system, the mails are sent to the
authenticated users who are intended to be received. Some
defects in existing system are:
 Suspicious mails cannot be detected.
 Offensive users cannot be identified.
Future scope
 In this project, suspicious users are identified
by determining the keywords used by
him/her.The keywords such as mailicious
code are found in the mails which are sent by
the user.All these blocked mails are checked
by the administrator and identify the users
who sent such mails.This is very useful in
real-time scenario in which you can resume
the anti-social activities.
THANK YOU

More Related Content

What's hot

Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
Jignesh Kariya
 
Transport layer
Transport layerTransport layer
Transport layer
reshmadayma
 
Strategy of software design
Strategy of software designStrategy of software design
Strategy of software design
Self-employed
 
3. distributed file system requirements
3. distributed file system requirements3. distributed file system requirements
3. distributed file system requirementsAbDul ThaYyal
 
Traditional Process Models
Traditional Process ModelsTraditional Process Models
Traditional Process Models
Ahsan Rahim
 
Delphi cost estimation model
Delphi cost estimation modelDelphi cost estimation model
Delphi cost estimation modelShashwat Shriparv
 
CRMS
CRMSCRMS
Ns2
Ns2Ns2
Design Concepts in Software Engineering-1.pptx
Design Concepts in Software Engineering-1.pptxDesign Concepts in Software Engineering-1.pptx
Design Concepts in Software Engineering-1.pptx
KarthigaiSelviS3
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
Ahmed Alageed
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
BigDataCloud
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management system
Krishna Kinkar Jha
 
Software myths | Software Engineering Notes
Software myths | Software Engineering NotesSoftware myths | Software Engineering Notes
Software myths | Software Engineering Notes
Navjyotsinh Jadeja
 
Project Report on Exam Suite/Test Application/Exam App ( JAVA )
Project Report on Exam Suite/Test Application/Exam App ( JAVA )Project Report on Exam Suite/Test Application/Exam App ( JAVA )
Project Report on Exam Suite/Test Application/Exam App ( JAVA )
paras91
 
Physical and Logical Clocks
Physical and Logical ClocksPhysical and Logical Clocks
Physical and Logical Clocks
Dilum Bandara
 

What's hot (20)

Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Transport layer
Transport layerTransport layer
Transport layer
 
Strategy of software design
Strategy of software designStrategy of software design
Strategy of software design
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
3. distributed file system requirements
3. distributed file system requirements3. distributed file system requirements
3. distributed file system requirements
 
Project explation ppt
Project explation pptProject explation ppt
Project explation ppt
 
Final Report(SuddhasatwaSatpathy)
Final Report(SuddhasatwaSatpathy)Final Report(SuddhasatwaSatpathy)
Final Report(SuddhasatwaSatpathy)
 
Traditional Process Models
Traditional Process ModelsTraditional Process Models
Traditional Process Models
 
Delphi cost estimation model
Delphi cost estimation modelDelphi cost estimation model
Delphi cost estimation model
 
CRMS
CRMSCRMS
CRMS
 
Ns2
Ns2Ns2
Ns2
 
Design Concepts in Software Engineering-1.pptx
Design Concepts in Software Engineering-1.pptxDesign Concepts in Software Engineering-1.pptx
Design Concepts in Software Engineering-1.pptx
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
 
Slides chapter 1
Slides chapter 1Slides chapter 1
Slides chapter 1
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management system
 
Software myths | Software Engineering Notes
Software myths | Software Engineering NotesSoftware myths | Software Engineering Notes
Software myths | Software Engineering Notes
 
Project Report on Exam Suite/Test Application/Exam App ( JAVA )
Project Report on Exam Suite/Test Application/Exam App ( JAVA )Project Report on Exam Suite/Test Application/Exam App ( JAVA )
Project Report on Exam Suite/Test Application/Exam App ( JAVA )
 
Physical and Logical Clocks
Physical and Logical ClocksPhysical and Logical Clocks
Physical and Logical Clocks
 

Viewers also liked

Mail server PPT By Mukesh
Mail server PPT By MukeshMail server PPT By Mukesh
Mail server PPT By Mukesh
Mukesh Kumar
 
mail server presentation
mail server presentationmail server presentation
mail server presentationaisadhsa
 
Mail Server Project Report
Mail Server Project ReportMail Server Project Report
Mail Server Project ReportKavita Sharma
 
Online Quiz System Project PPT
Online Quiz System Project PPTOnline Quiz System Project PPT
Online Quiz System Project PPT
Shanthan Reddy
 

Viewers also liked (6)

Mail server
Mail serverMail server
Mail server
 
Mail server PPT By Mukesh
Mail server PPT By MukeshMail server PPT By Mukesh
Mail server PPT By Mukesh
 
Mail server
Mail serverMail server
Mail server
 
mail server presentation
mail server presentationmail server presentation
mail server presentation
 
Mail Server Project Report
Mail Server Project ReportMail Server Project Report
Mail Server Project Report
 
Online Quiz System Project PPT
Online Quiz System Project PPTOnline Quiz System Project PPT
Online Quiz System Project PPT
 

Similar to Harmfull mail scanning

Suspicious Email Detection
Suspicious Email DetectionSuspicious Email Detection
Suspicious Email DetectionSuraj Kumar
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
Akshita Pillai
 
3.exposure of suspicious email
3.exposure of suspicious email3.exposure of suspicious email
3.exposure of suspicious email
Pvrtechnologies Nellore
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_Synopsis
Manmeet Sinha
 
Mail tracker mini
Mail tracker miniMail tracker mini
Mail tracker minipendyam
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .net
Georgekutty Francis
 
Chat application through client server management system project.pdf
Chat application through client server management system project.pdfChat application through client server management system project.pdf
Chat application through client server management system project.pdf
Kamal Acharya
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolVinod Gurram
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
Editor IJCATR
 
Java project titles
Java project titlesJava project titles
Java project titlesAshly Liza
 
E-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector MachineE-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector Machine
IRJET Journal
 
Suspicious Mail Detection IEEE
Suspicious Mail Detection IEEESuspicious Mail Detection IEEE
Suspicious Mail Detection IEEENikhil Kulkarni
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Online dating system management project report.pdf
Online dating system management project report.pdfOnline dating system management project report.pdf
Online dating system management project report.pdf
Kamal Acharya
 
Project scheduler doc
Project scheduler docProject scheduler doc
Project scheduler doc
NAGENDRA KUAMR
 
Job portal
Job portalJob portal
Job portal
Arman Ahmed
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
IRJET Journal
 
library management
library management library management
library management
sarthakkhanna1994
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester Synopsis
Hitesh Jangid
 
ProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation reportProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation report
komkar98230
 

Similar to Harmfull mail scanning (20)

Suspicious Email Detection
Suspicious Email DetectionSuspicious Email Detection
Suspicious Email Detection
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
 
3.exposure of suspicious email
3.exposure of suspicious email3.exposure of suspicious email
3.exposure of suspicious email
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_Synopsis
 
Mail tracker mini
Mail tracker miniMail tracker mini
Mail tracker mini
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .net
 
Chat application through client server management system project.pdf
Chat application through client server management system project.pdfChat application through client server management system project.pdf
Chat application through client server management system project.pdf
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 
Java project titles
Java project titlesJava project titles
Java project titles
 
E-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector MachineE-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector Machine
 
Suspicious Mail Detection IEEE
Suspicious Mail Detection IEEESuspicious Mail Detection IEEE
Suspicious Mail Detection IEEE
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Online dating system management project report.pdf
Online dating system management project report.pdfOnline dating system management project report.pdf
Online dating system management project report.pdf
 
Project scheduler doc
Project scheduler docProject scheduler doc
Project scheduler doc
 
Job portal
Job portalJob portal
Job portal
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
library management
library management library management
library management
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester Synopsis
 
ProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation reportProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation report
 

Recently uploaded

Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 

Recently uploaded (20)

Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 

Harmfull mail scanning

  • 1. PROJECT TITLE:-SUSPICIOUS E-MAIL SCANNING GUIDED BY: Mr. Anuj kumar Mr. Shivnath Gupta Mr. B. Narasingh Patro PRESENTED BY: Shammi kumar Vikash lal Rahul kumar
  • 2. CONTENT 1. Introduction About Project 2. Objective Of Project 3. Module of Project 4. Tools Use In The Project 5. System Architecture 6. Data Flow Diagram 7. E R Diagram 8. Analysis Of The Project 9. Future Scope
  • 3. INTRODUCTION Suspicious email detection is a kind of mailing system where suspicious users are identified by determining the keywords used by him/her.The keywords such as malicious code are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails.
  • 4. The aim of this project is to suspect the E-mails which consist of offensive, anti-social elements and block them which help in identifying the suspicious user. OBJECTIVE OF THIS PROJECT
  • 5. MODULES Modules in the Suspicious E-mail detection  Login Module  Registration Module  Administration Module  User Module  Mailing Module
  • 6. 1.LOGIN MODULE 2.REGISTRATION MODULE This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the secure mail. This module is used by administrator and users (who are authenticated) to login into the secure mail. The login details of the specified person will be entered and hence can enter into the secure mail.
  • 7. 3.ADMINISTRATION MODULE 4.User Module This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails. This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message
  • 8. 5.MAILING MODULE This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox.
  • 9. SOFTWARE REQUIREMENTS  Operating System :: Windows 7/8  Server Side :: JSP with Tomcat Server  Client Side :: HTML , JavaScript, Core Java  Services :: JDBC  Database :: Oracle 10g/XE
  • 10. HARDWARE REQUIREMENTS  Pentium processor -------- 233 MHZ or above  RAM Capacity -------- 256MB  Hard Disk -------- 20GB
  • 14. ANALYSIS OF THE PROJECT ADVANTAGES :-  This helps in finding out anti social elements.  This provides the security to system which adapts it.  This also helps the intelligence bureau, crime branch etc.,  Insurance premium calculations, for quarterly, half yearly and annually is completely automated gives us a reliable environment.  The system provides claim reporting and status enquiry. DISADVANTAGES :-  In the existing system, the mails are sent to the authenticated users who are intended to be received. Some defects in existing system are:  Suspicious mails cannot be detected.  Offensive users cannot be identified.
  • 15. Future scope  In this project, suspicious users are identified by determining the keywords used by him/her.The keywords such as mailicious code are found in the mails which are sent by the user.All these blocked mails are checked by the administrator and identify the users who sent such mails.This is very useful in real-time scenario in which you can resume the anti-social activities.