Submit Search
Upload
Improvement of Legitimate Mail Server Detection Method using Sender Authentication
•
0 likes
•
4 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i6/IRJET-V9I6624.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
Intelligent Spam Mail Detection System
Intelligent Spam Mail Detection System
IRJET Journal
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
IRJET Journal
IRJET- Special Organization through Entity Ruling for Handling E-Grievance
IRJET- Special Organization through Entity Ruling for Handling E-Grievance
IRJET Journal
E-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector Machine
IRJET Journal
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
IRJET Journal
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET Journal
ONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATION
IRJET Journal
IRJET- Restful Backend to Serve any Frontend System
IRJET- Restful Backend to Serve any Frontend System
IRJET Journal
Recommended
Intelligent Spam Mail Detection System
Intelligent Spam Mail Detection System
IRJET Journal
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
IRJET Journal
IRJET- Special Organization through Entity Ruling for Handling E-Grievance
IRJET- Special Organization through Entity Ruling for Handling E-Grievance
IRJET Journal
E-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector Machine
IRJET Journal
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
IRJET Journal
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET Journal
ONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATION
IRJET Journal
IRJET- Restful Backend to Serve any Frontend System
IRJET- Restful Backend to Serve any Frontend System
IRJET Journal
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
IRJET- Automatic Courier Management System
IRJET- Automatic Courier Management System
IRJET Journal
Development of email notification system based on user criteria
Development of email notification system based on user criteria
IRJET Journal
IRJET- Email Spam Detection & Automation
IRJET- Email Spam Detection & Automation
IRJET Journal
Optical Character Recognition based KYC System
Optical Character Recognition based KYC System
IRJET Journal
E-Invoice Generator
E-Invoice Generator
IRJET Journal
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
IRJET Journal
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET Journal
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET Journal
IRJET- In-House File Tracking System
IRJET- In-House File Tracking System
IRJET Journal
Basic Office Administration
Basic Office Administration
IRJET Journal
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET Journal
COLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEM
IRJET Journal
IRJET - Android Application Service Call Management System
IRJET - Android Application Service Call Management System
IRJET Journal
IRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering Technique
IRJET Journal
Online examination system
Online examination system
IRJET Journal
IRJET- E-Payment and Transactions using QR Codes
IRJET- E-Payment and Transactions using QR Codes
IRJET Journal
ATM fraud detection system using machine learning algorithms
ATM fraud detection system using machine learning algorithms
IRJET Journal
IRJET- A Review on Bug Tracking System
IRJET- A Review on Bug Tracking System
IRJET Journal
IRJET - E-Commerce Website With Enhanced Security
IRJET - E-Commerce Website With Enhanced Security
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Improvement of Legitimate Mail Server Detection Method using Sender Authentication
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
IRJET- Automatic Courier Management System
IRJET- Automatic Courier Management System
IRJET Journal
Development of email notification system based on user criteria
Development of email notification system based on user criteria
IRJET Journal
IRJET- Email Spam Detection & Automation
IRJET- Email Spam Detection & Automation
IRJET Journal
Optical Character Recognition based KYC System
Optical Character Recognition based KYC System
IRJET Journal
E-Invoice Generator
E-Invoice Generator
IRJET Journal
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
IRJET Journal
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET Journal
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET Journal
IRJET- In-House File Tracking System
IRJET- In-House File Tracking System
IRJET Journal
Basic Office Administration
Basic Office Administration
IRJET Journal
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET Journal
COLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEM
IRJET Journal
IRJET - Android Application Service Call Management System
IRJET - Android Application Service Call Management System
IRJET Journal
IRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering Technique
IRJET Journal
Online examination system
Online examination system
IRJET Journal
IRJET- E-Payment and Transactions using QR Codes
IRJET- E-Payment and Transactions using QR Codes
IRJET Journal
ATM fraud detection system using machine learning algorithms
ATM fraud detection system using machine learning algorithms
IRJET Journal
IRJET- A Review on Bug Tracking System
IRJET- A Review on Bug Tracking System
IRJET Journal
IRJET - E-Commerce Website With Enhanced Security
IRJET - E-Commerce Website With Enhanced Security
IRJET Journal
Similar to Improvement of Legitimate Mail Server Detection Method using Sender Authentication
(20)
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET- Automatic Courier Management System
IRJET- Automatic Courier Management System
Development of email notification system based on user criteria
Development of email notification system based on user criteria
IRJET- Email Spam Detection & Automation
IRJET- Email Spam Detection & Automation
Optical Character Recognition based KYC System
Optical Character Recognition based KYC System
E-Invoice Generator
E-Invoice Generator
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- In-House File Tracking System
IRJET- In-House File Tracking System
Basic Office Administration
Basic Office Administration
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
COLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEM
IRJET - Android Application Service Call Management System
IRJET - Android Application Service Call Management System
IRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering Technique
Online examination system
Online examination system
IRJET- E-Payment and Transactions using QR Codes
IRJET- E-Payment and Transactions using QR Codes
ATM fraud detection system using machine learning algorithms
ATM fraud detection system using machine learning algorithms
IRJET- A Review on Bug Tracking System
IRJET- A Review on Bug Tracking System
IRJET - E-Commerce Website With Enhanced Security
IRJET - E-Commerce Website With Enhanced Security
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
Karpagam Institute of Teechnology
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
archanaece3
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
ssuser5c9d4b1
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Er.Sonali Nasikkar
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
MANASINANDKISHORDEOR
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
Morshed Ahmed Rahath
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
Mustafa Ahmed
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
IJECEIAES
Intro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney Uni
R. Sosa
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
JNTUA
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
electrical installation and maintenance.
electrical installation and maintenance.
benjamincojr
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
VIEW
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
Amil baba
Basics of Relay for Engineering Students
Basics of Relay for Engineering Students
kannan348865
Insurance management system project report.pdf
Insurance management system project report.pdf
Kamal Acharya
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
T.D. Shashikala
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
Mustafa Ahmed
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
Alexander Litvinenko
Recently uploaded
(20)
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Intro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney Uni
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
electrical installation and maintenance.
electrical installation and maintenance.
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
Basics of Relay for Engineering Students
Basics of Relay for Engineering Students
Insurance management system project report.pdf
Insurance management system project report.pdf
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
Improvement of Legitimate Mail Server Detection Method using Sender Authentication
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3130 Improvement of Legitimate Mail Server Detection Method using Sender Authentication Asst. Prof. Kavya R1, Pooja P2, Jayant PB3, Jayanth kowshik4, Sushmitha MH5 1Assistant Professor, Dept. of CSE, Vidya Vikas Institute of Engineering and Technology, Mysore, Karnataka, India. 2,3,4,5 Student, Dept. of CSE, Vidya Vikas Institute of Engineering and Technology, Mysore, Karnataka, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The anti-spam measures include ways to detect unsolicited email from email content and ways to use sender information. If it cannot be determined from the sender's IP address of the sender information and the sender's domain name whether the email should be received, it is possible to reduce the processing of spam filter by email content which has a heavy load of processing to determine. This study uses sender authentication technology to identify the sender of the forwarded email. We think the sender of this forwarded email is the official email sender to receive, and we suggest using them as a checklist. In this paper, we propose a way to further improve the approach we have proposed and reduce the misinterpretation of the approval list. We have verified that this new method works using login details for emails that are not actually accepted. Key Words: Unsolicited emails, legitimated email, Authentication technology, Ip address, AntiSpam. 1. INTRODUCTION Spam issues are not only annoying but also cause various security issues. For example, email is used as a way to pass on false information for the purposes of money exploitation, such as phishing and business email interception (BEC). Additionally, email is misused as a means of sending malware for information theft and creating externally controllable PCs called bots. To protect email users from spam, it is effective to apply spam filters on the receiving end. Various methods have been developed for the technology used in spam filters and have been effective to some extent. On the other hand, spammers are also trying to avoid being detected by these spam filters, and misperception of spam filters has become an inevitable problem. The problem of false positives identifying legitimate emails as spam is a major concern, especially for business email users. Fig1: Architecture of the System. 2. LITERATURE SURVEY • Legitimate mail server detection The problem of phishing email, also known as spam, including targeted phishing or spam-derived malware, has necessitated the need for reliable intelligent anti-spam email filters. This survey report describes a focused literature search on Artificial Intelligence (AI) and Machine Learning (ML) methods for intelligent spam email detection, which we believe can help develop appropriate countermeasures. • IP address and protocol In this article, we propose a method of collecting legitimate email servers as a method of building sender reputation. Legitimate e-mail servers collect the forwarded e-mail using their senders. This method is an improvement over the previously proposed method [7] in order to reduce false positives. We verified using the spam filter's evaluation result to evaluate whether the legitimate email server collected was correct. 3. REQUIREMENT ANALYSIS To achieve the aim of this system, the systemrequirements need to be determined. In this part the detail of the requirements will be determined in the following steps:
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3131 System Requirements The software requirements are: 1. Database: MongoDB 2. Tools: JDK 8, NetBeans IDE 8.0, Heidisql 3. Backend Language: MySQL 5.0 Server 4. Frontend Language: Java AWT and Java Swing. The Hardware requirements are: 1. System processor: 1.8GHz or more. 2. System RAM: 2GB or more. 3. Processor bit: 32bit or 64bit. 4. Hard disk space: 20GB or more 4. DESIGN The two main components of systems development are system analysis and system design. The system architecture is created during the system design phase. Maps the requirement to the architecture. Components, their interfaces and behaviors are defined in the architecture. The design document describes an email authentication database. Fig2: Data Flow diagram showing communicationbetween sender and authentication. Fig2 depicts the high-level design of the proposed system, where the broker or the main node, is the intermediation between the two ends i.e. Register and inbox/outbox, where the each module can how to register and send messages through sender to receiver that time how hacker can hack messages that messages to avoid through detection and digital signature that will be showed in this data flow diagram. Fig3: sequence diagram of sender and attacker Fig3 shows the Sequence diagram of the proposed system where initially, sender and receiver communication that time how attacker can change the messages how flood attack will be happened in mail server and how this project is helpful to avoid the flood attacks that will be showed in the figure. Fig4: Sequence diagram of Mail User Fig 4: A Mail User is for receiving email. Since a Mail User is for redirecting email to an external address, that external address is usually where they would send email from.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072 Volume: 07 Issue: 05 | May 2020 www.irjet.net © 2020, IRJET Impact Factor value: 7.529 ISO 9001:2008 Certified Journal | Page 3132 Fig 5:Class diagram of Mail Server Fig 5: A Communication between Mail server and the Register and Menu part in the Project. 4. CONCLUSIONS In this article, we have described the development of a allow list generation method by detecting forwarded mail using sender authentication technology and extracting legitimate mail servers from this forwarding source. This method focused on forwarded emails, assumed the sender was a legitimate email sender to receive, and offered a method to collect legitimate email senders. Also, in this improvement method, we have introduced a procedure to exclude spam sources that should not be included from legitimate email sources. It has been shown that erroneous judgments can be reduced by applying this optimization method to actually received e-mails, whether it is effective or not. From these results, we were able to show that our improvement method was effective.. REFERENCES detection”,2018. BIOGRAPHIES KAVYA R ASSISTANT PROFESSOR VVIET CLG MYSORE-570028 JAYANTH PB VVIET CLG MYSORE-570028 POOJA P VVIET CLG MYSORE-570028 JAYANTH KOWSHIK VVIET CLG MYSORE-570028 SUSHMITHA MH VVIET CLG MYSORE-570028 [1] Nidhi Tomar, Amit Kumar Manjhvar, “An improved optimized clustering technique for crime detection”, in symposium on colossal data analysis and networking(CDAN) 2016. operandi:A simple apriori algorithm for crime pattern [2] Peng Chen, Justin Kurland, “Time, place and modus [3] Shyam Varan Nath, “Crime pattern detection using [4] Chung-Hsien Yu1, Max W. Ward1, Melissa Morabito2, and Wei Ding, “ crime forecasting using data mining technique”, Department of Computer Science, 2Department of Sociology, University of Massachusetts Boston, 100 Morrissey Blvd., Boston, MA 02125-2018. data mining”, oracle corporation 2017.
Download now