SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3130
Improvement of Legitimate Mail Server Detection Method using Sender
Authentication
Asst. Prof. Kavya R1, Pooja P2, Jayant PB3, Jayanth kowshik4, Sushmitha MH5
1Assistant Professor, Dept. of CSE, Vidya Vikas Institute of Engineering and Technology, Mysore, Karnataka, India.
2,3,4,5 Student, Dept. of CSE, Vidya Vikas Institute of Engineering and Technology, Mysore, Karnataka, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The anti-spam measures include ways to detect
unsolicited email from email content and ways to use sender
information. If it cannot be determined from the sender's IP
address of the sender information and the sender's domain
name whether the email should be received, it is possible to
reduce the processing of spam filter by email content which
has a heavy load of processing to determine. This study uses
sender authentication technology to identify the sender of
the forwarded email. We think the sender of this forwarded
email is the official email sender to receive, and we suggest
using them as a checklist. In this paper, we propose a way to
further improve the approach we have proposed and reduce
the misinterpretation of the approval list. We have verified
that this new method works using login details for emails
that are not actually accepted.
Key Words: Unsolicited emails, legitimated email,
Authentication technology, Ip address, AntiSpam.
1. INTRODUCTION
Spam issues are not only annoying but also cause various
security issues. For example, email is used as a way to pass
on false information for the purposes of money
exploitation, such as phishing and business email
interception (BEC). Additionally, email is misused as a
means of sending malware for information theft and
creating externally controllable PCs called bots. To protect
email users from spam, it is effective to apply spam filters
on the receiving end. Various methods have been
developed for the technology used in spam filters and have
been effective to some extent. On the other hand,
spammers are also trying to avoid being detected by these
spam filters, and misperception of spam filters has become
an inevitable problem. The problem of false positives
identifying legitimate emails as spam is a major concern,
especially for business email users.
Fig1: Architecture of the System.
2. LITERATURE SURVEY
• Legitimate mail server detection
The problem of phishing email, also known as spam,
including targeted phishing or spam-derived malware, has
necessitated the need for reliable intelligent anti-spam email
filters. This survey report describes a focused literature
search on Artificial Intelligence (AI) and Machine Learning
(ML) methods for intelligent spam email detection, which we
believe can help develop appropriate countermeasures.
• IP address and protocol
In this article, we propose a method of collecting legitimate
email servers as a method of building sender reputation.
Legitimate e-mail servers collect the forwarded e-mail using
their senders. This method is an improvement over the
previously proposed method [7] in order to reduce false
positives. We verified using the spam filter's evaluation
result to evaluate whether the legitimate email server
collected was correct.
3. REQUIREMENT ANALYSIS
To achieve the aim of this system, the systemrequirements
need to be determined. In this part the detail of the
requirements will be determined in the following steps:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3131
System Requirements
 The software requirements are:
1. Database: MongoDB
2. Tools: JDK 8, NetBeans IDE 8.0, Heidisql
3. Backend Language: MySQL 5.0 Server
4. Frontend Language: Java AWT and Java Swing.
 The Hardware requirements are:
1. System processor: 1.8GHz or more.
2. System RAM: 2GB or more.
3. Processor bit: 32bit or 64bit.
4. Hard disk space: 20GB or more
4. DESIGN
The two main components of systems development are
system analysis and system design. The system
architecture is created during the system design phase.
Maps the requirement to the architecture. Components,
their interfaces and behaviors are defined in the
architecture. The design document describes an email
authentication database.
Fig2: Data Flow diagram showing communicationbetween
sender and authentication.
Fig2 depicts the high-level design of the proposed system,
where the broker or the main node, is the intermediation
between the two ends i.e. Register and inbox/outbox,
where the each module can how to register and send
messages through sender to receiver that time how
hacker can hack messages that messages to avoid
through detection and digital signature that will be
showed in this data flow diagram.
Fig3: sequence diagram of sender and attacker
Fig3 shows the Sequence diagram of the proposed system
where initially, sender and receiver communication that
time how attacker can change the messages how flood
attack will be happened in mail server and how this
project is helpful to avoid the flood attacks that will be
showed in the figure.
Fig4: Sequence diagram of Mail User
Fig 4: A Mail User is for receiving email. Since a Mail User is
for redirecting email to an external address, that external
address is usually where they would send email from.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
p-ISSN: 2395-0072
Volume: 07 Issue: 05 | May 2020 www.irjet.net
© 2020, IRJET Impact Factor value: 7.529 ISO 9001:2008 Certified Journal | Page 3132
Fig 5:Class diagram of Mail Server
Fig 5: A Communication between Mail server and the
Register and Menu part in the Project.
4. CONCLUSIONS
In this article, we have described the development of a
allow list generation method by detecting forwarded mail
using sender authentication technology and extracting
legitimate mail servers from this forwarding source.
This method focused on forwarded emails, assumed the
sender was a legitimate email sender to receive, and
offered a method to collect legitimate email senders. Also,
in this improvement method, we have introduced a
procedure to exclude spam sources that should not be
included from legitimate email sources. It has been shown
that erroneous judgments can be reduced by applying this
optimization method to actually received e-mails,
whether it is effective or not. From these results, we were
able to show that our improvement method was effective..
REFERENCES
detection”,2018.
BIOGRAPHIES
KAVYA R
ASSISTANT PROFESSOR
VVIET CLG
MYSORE-570028
JAYANTH PB
VVIET CLG
MYSORE-570028
POOJA P
VVIET CLG
MYSORE-570028
JAYANTH KOWSHIK
VVIET CLG
MYSORE-570028
SUSHMITHA MH
VVIET CLG
MYSORE-570028
[1] Nidhi Tomar, Amit Kumar Manjhvar, “An
improved optimized clustering technique for crime
detection”, in symposium on colossal data analysis and
networking(CDAN) 2016.
operandi:A simple apriori algorithm for crime
pattern
[2] Peng Chen, Justin Kurland, “Time, place and
modus
[3] Shyam Varan Nath, “Crime pattern detection using
[4] Chung-Hsien Yu1, Max W. Ward1, Melissa
Morabito2, and Wei Ding, “ crime forecasting using data
mining technique”, Department of Computer Science,
2Department of Sociology, University of
Massachusetts Boston, 100 Morrissey Blvd., Boston, MA
02125-2018.
data mining”, oracle corporation 2017.

More Related Content

Similar to Improvement of Legitimate Mail Server Detection Method using Sender Authentication

IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 
IRJET- Automatic Courier Management System
IRJET- Automatic Courier Management SystemIRJET- Automatic Courier Management System
IRJET- Automatic Courier Management SystemIRJET Journal
 
Development of email notification system based on user criteria
Development of email notification system based on user criteriaDevelopment of email notification system based on user criteria
Development of email notification system based on user criteriaIRJET Journal
 
IRJET- Email Spam Detection & Automation
IRJET- Email Spam Detection & AutomationIRJET- Email Spam Detection & Automation
IRJET- Email Spam Detection & AutomationIRJET Journal
 
Optical Character Recognition based KYC System
Optical Character Recognition based KYC SystemOptical Character Recognition based KYC System
Optical Character Recognition based KYC SystemIRJET Journal
 
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...IRJET Journal
 
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET Journal
 
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET Journal
 
IRJET- In-House File Tracking System
IRJET-  	  In-House File Tracking SystemIRJET-  	  In-House File Tracking System
IRJET- In-House File Tracking SystemIRJET Journal
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office AdministrationIRJET Journal
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
COLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEMCOLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEMIRJET Journal
 
IRJET - Android Application Service Call Management System
IRJET  -  	  Android Application Service Call Management SystemIRJET  -  	  Android Application Service Call Management System
IRJET - Android Application Service Call Management SystemIRJET Journal
 
IRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering TechniqueIRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering TechniqueIRJET Journal
 
Online examination system
Online examination system Online examination system
Online examination system IRJET Journal
 
IRJET- E-Payment and Transactions using QR Codes
IRJET- E-Payment and Transactions using QR CodesIRJET- E-Payment and Transactions using QR Codes
IRJET- E-Payment and Transactions using QR CodesIRJET Journal
 
ATM fraud detection system using machine learning algorithms
ATM fraud detection system using machine learning algorithmsATM fraud detection system using machine learning algorithms
ATM fraud detection system using machine learning algorithmsIRJET Journal
 
IRJET- A Review on Bug Tracking System
IRJET- A Review on Bug Tracking SystemIRJET- A Review on Bug Tracking System
IRJET- A Review on Bug Tracking SystemIRJET Journal
 
IRJET - E-Commerce Website With Enhanced Security
IRJET - E-Commerce Website With Enhanced SecurityIRJET - E-Commerce Website With Enhanced Security
IRJET - E-Commerce Website With Enhanced SecurityIRJET Journal
 

Similar to Improvement of Legitimate Mail Server Detection Method using Sender Authentication (20)

IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
IRJET- Automatic Courier Management System
IRJET- Automatic Courier Management SystemIRJET- Automatic Courier Management System
IRJET- Automatic Courier Management System
 
Development of email notification system based on user criteria
Development of email notification system based on user criteriaDevelopment of email notification system based on user criteria
Development of email notification system based on user criteria
 
IRJET- Email Spam Detection & Automation
IRJET- Email Spam Detection & AutomationIRJET- Email Spam Detection & Automation
IRJET- Email Spam Detection & Automation
 
Optical Character Recognition based KYC System
Optical Character Recognition based KYC SystemOptical Character Recognition based KYC System
Optical Character Recognition based KYC System
 
E-Invoice Generator
E-Invoice GeneratorE-Invoice Generator
E-Invoice Generator
 
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
 
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
 
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
 
IRJET- In-House File Tracking System
IRJET-  	  In-House File Tracking SystemIRJET-  	  In-House File Tracking System
IRJET- In-House File Tracking System
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office Administration
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
COLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEMCOLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEM
 
IRJET - Android Application Service Call Management System
IRJET  -  	  Android Application Service Call Management SystemIRJET  -  	  Android Application Service Call Management System
IRJET - Android Application Service Call Management System
 
IRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering TechniqueIRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering Technique
 
Online examination system
Online examination system Online examination system
Online examination system
 
IRJET- E-Payment and Transactions using QR Codes
IRJET- E-Payment and Transactions using QR CodesIRJET- E-Payment and Transactions using QR Codes
IRJET- E-Payment and Transactions using QR Codes
 
ATM fraud detection system using machine learning algorithms
ATM fraud detection system using machine learning algorithmsATM fraud detection system using machine learning algorithms
ATM fraud detection system using machine learning algorithms
 
IRJET- A Review on Bug Tracking System
IRJET- A Review on Bug Tracking SystemIRJET- A Review on Bug Tracking System
IRJET- A Review on Bug Tracking System
 
IRJET - E-Commerce Website With Enhanced Security
IRJET - E-Commerce Website With Enhanced SecurityIRJET - E-Commerce Website With Enhanced Security
IRJET - E-Commerce Website With Enhanced Security
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfssuser5c9d4b1
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxMANASINANDKISHORDEOR
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New HorizonMorshed Ahmed Rahath
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
 
Intro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney UniIntro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney UniR. Sosa
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docxrahulmanepalli02
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.benjamincojr
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsVIEW
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...Amil baba
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdfKamal Acharya
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 

Recently uploaded (20)

analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Intro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney UniIntro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney Uni
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 

Improvement of Legitimate Mail Server Detection Method using Sender Authentication

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3130 Improvement of Legitimate Mail Server Detection Method using Sender Authentication Asst. Prof. Kavya R1, Pooja P2, Jayant PB3, Jayanth kowshik4, Sushmitha MH5 1Assistant Professor, Dept. of CSE, Vidya Vikas Institute of Engineering and Technology, Mysore, Karnataka, India. 2,3,4,5 Student, Dept. of CSE, Vidya Vikas Institute of Engineering and Technology, Mysore, Karnataka, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The anti-spam measures include ways to detect unsolicited email from email content and ways to use sender information. If it cannot be determined from the sender's IP address of the sender information and the sender's domain name whether the email should be received, it is possible to reduce the processing of spam filter by email content which has a heavy load of processing to determine. This study uses sender authentication technology to identify the sender of the forwarded email. We think the sender of this forwarded email is the official email sender to receive, and we suggest using them as a checklist. In this paper, we propose a way to further improve the approach we have proposed and reduce the misinterpretation of the approval list. We have verified that this new method works using login details for emails that are not actually accepted. Key Words: Unsolicited emails, legitimated email, Authentication technology, Ip address, AntiSpam. 1. INTRODUCTION Spam issues are not only annoying but also cause various security issues. For example, email is used as a way to pass on false information for the purposes of money exploitation, such as phishing and business email interception (BEC). Additionally, email is misused as a means of sending malware for information theft and creating externally controllable PCs called bots. To protect email users from spam, it is effective to apply spam filters on the receiving end. Various methods have been developed for the technology used in spam filters and have been effective to some extent. On the other hand, spammers are also trying to avoid being detected by these spam filters, and misperception of spam filters has become an inevitable problem. The problem of false positives identifying legitimate emails as spam is a major concern, especially for business email users. Fig1: Architecture of the System. 2. LITERATURE SURVEY • Legitimate mail server detection The problem of phishing email, also known as spam, including targeted phishing or spam-derived malware, has necessitated the need for reliable intelligent anti-spam email filters. This survey report describes a focused literature search on Artificial Intelligence (AI) and Machine Learning (ML) methods for intelligent spam email detection, which we believe can help develop appropriate countermeasures. • IP address and protocol In this article, we propose a method of collecting legitimate email servers as a method of building sender reputation. Legitimate e-mail servers collect the forwarded e-mail using their senders. This method is an improvement over the previously proposed method [7] in order to reduce false positives. We verified using the spam filter's evaluation result to evaluate whether the legitimate email server collected was correct. 3. REQUIREMENT ANALYSIS To achieve the aim of this system, the systemrequirements need to be determined. In this part the detail of the requirements will be determined in the following steps:
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3131 System Requirements  The software requirements are: 1. Database: MongoDB 2. Tools: JDK 8, NetBeans IDE 8.0, Heidisql 3. Backend Language: MySQL 5.0 Server 4. Frontend Language: Java AWT and Java Swing.  The Hardware requirements are: 1. System processor: 1.8GHz or more. 2. System RAM: 2GB or more. 3. Processor bit: 32bit or 64bit. 4. Hard disk space: 20GB or more 4. DESIGN The two main components of systems development are system analysis and system design. The system architecture is created during the system design phase. Maps the requirement to the architecture. Components, their interfaces and behaviors are defined in the architecture. The design document describes an email authentication database. Fig2: Data Flow diagram showing communicationbetween sender and authentication. Fig2 depicts the high-level design of the proposed system, where the broker or the main node, is the intermediation between the two ends i.e. Register and inbox/outbox, where the each module can how to register and send messages through sender to receiver that time how hacker can hack messages that messages to avoid through detection and digital signature that will be showed in this data flow diagram. Fig3: sequence diagram of sender and attacker Fig3 shows the Sequence diagram of the proposed system where initially, sender and receiver communication that time how attacker can change the messages how flood attack will be happened in mail server and how this project is helpful to avoid the flood attacks that will be showed in the figure. Fig4: Sequence diagram of Mail User Fig 4: A Mail User is for receiving email. Since a Mail User is for redirecting email to an external address, that external address is usually where they would send email from.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072 Volume: 07 Issue: 05 | May 2020 www.irjet.net © 2020, IRJET Impact Factor value: 7.529 ISO 9001:2008 Certified Journal | Page 3132 Fig 5:Class diagram of Mail Server Fig 5: A Communication between Mail server and the Register and Menu part in the Project. 4. CONCLUSIONS In this article, we have described the development of a allow list generation method by detecting forwarded mail using sender authentication technology and extracting legitimate mail servers from this forwarding source. This method focused on forwarded emails, assumed the sender was a legitimate email sender to receive, and offered a method to collect legitimate email senders. Also, in this improvement method, we have introduced a procedure to exclude spam sources that should not be included from legitimate email sources. It has been shown that erroneous judgments can be reduced by applying this optimization method to actually received e-mails, whether it is effective or not. From these results, we were able to show that our improvement method was effective.. REFERENCES detection”,2018. BIOGRAPHIES KAVYA R ASSISTANT PROFESSOR VVIET CLG MYSORE-570028 JAYANTH PB VVIET CLG MYSORE-570028 POOJA P VVIET CLG MYSORE-570028 JAYANTH KOWSHIK VVIET CLG MYSORE-570028 SUSHMITHA MH VVIET CLG MYSORE-570028 [1] Nidhi Tomar, Amit Kumar Manjhvar, “An improved optimized clustering technique for crime detection”, in symposium on colossal data analysis and networking(CDAN) 2016. operandi:A simple apriori algorithm for crime pattern [2] Peng Chen, Justin Kurland, “Time, place and modus [3] Shyam Varan Nath, “Crime pattern detection using [4] Chung-Hsien Yu1, Max W. Ward1, Melissa Morabito2, and Wei Ding, “ crime forecasting using data mining technique”, Department of Computer Science, 2Department of Sociology, University of Massachusetts Boston, 100 Morrissey Blvd., Boston, MA 02125-2018. data mining”, oracle corporation 2017.