SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | April 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4105
Suspicious Mail Detection
Madhav Gupta1, Romit Shriwal2, Divyansh Negi3, Devarshi Pandey4, Asst Prof Ms. Shikha Rai5
1,2,3,4B.Tech Student, Dept. of Information Technology, Dr. Akilesh Das Gupta Institute of Technology and
Management Delhi
5Mentor: Assistant Professor Ms. Shikha Rai, Dept. of Information Technology, Dr. Akhilesh Das Gupta Institute of
Technology and Management, Delhi-110053
--------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Over the past two decades email have become
one of the most important and widely used means of
communication in various organization and in our personal
lives but email has also been used in variousorganized attacks
around the world so there is a need in inspecting the
suspicious mail wehaveutilizedsomecryptographicstrategies
for electronic mail detection. Security hasgreatsignificancein
the world of Internet and for communication. Triple Data
encryption algorithm is a symmetric-key encryption method
that provides reliability and safetyincommunication. Byusing
a Triple Data Encryption Algorithm, the security has been
improved which is very crucial and necessary in the field of
email and world wide web.
Key Words: Decryption, Encryption, TDEA, 3DES, Cipher
Text
1. INTRODUCTION
Electronic Mail or E-Mail is amongst the fastest means of
communication it is mainly used for formal as well informal
communication. E-Mailsareoftenusedtocommunicatetoan
individual or group of people, people use E-Mail because its
quick, free and easy to use for this reasons email has quickly
become a source of suspicious activity such as terrorism,
frauds and other malicious activity over the internet.
In this research paper we have applied techniques to notice
suspicious mails, i.e., associate degree mail that can alert of
upcoming unethical events. We have used Triple Data
Encryption Algorithm also known as TDEA or Triple-DES
(Data Encryption Standard), which focus on a plain text
message, when TDEA is used for first time it is used to
encrypt the message then the 2nd key is used to decrypt the
message which was encrypted. (Because the 2nd key is not a
proper key, the data gets scrambled further) then the
message which has been scrambled twice is encryptedagain
with 1st key to give the last ciphered message. This
procedure which is done in 3 steps is known as TDES, Triple
DES is a type of DES which is done 3 times by using 2 keys in
a certain order. (TDEA can also use 3 different keys instead
of only using 2. In both the cases the result is 2^112 key
space).
A pre-emptive approach to solving bribery,con,terrorismor
any other activity harming the society for an organization
would be to detect it. Since most of these activities are
carried out via an organized approach, hence, they require
communication among different members. Electronic
mailing systems in organizations is the most common and
well-known communication link for the cons or malicious
users. Suspicious mail detection helps the admins or the
analysts to effectively spot suspicious communication and
take the required actions ahead of the hazard and also in-
time alert is sent to the admin.
In this research paper, we will identify the unethical mails
which users send from the system who are registered. The
new users get registered first and then they send mail to
other registered users and after that theycanviewmessages
from the other users. Triple Data Encryption Algorithm is
used by the administrator to encrypt messages which are
being sent to the users and administrator can also view and
send warnings about the suspicious activities if found.
For this system to work, we use a data dictionary to identify
the words which raise the suspicion. Words suchasrobbery,
bribe which are not used in every day to day conversationor
messages.
2. Suspicious Mail Detection
Suspicious mail detection is a type of system by which
suspected users are detected by identifying the types of
words he/she uses. Words can be as hijacking, explosion
which can be found in their mails which they send to others.
These kinds of mails are then checked bytheadminandthen
the admin can figure out the identityoftheseuserswhohave
sent these mails.
This type of system will work in finding unethical elements.
This will also provide better security to the system who
decides to adapt it. This can also work in Law Enforcement,
and other branch of government offices to monitor of any
suspicious activity. This system canprovideinformation and
reporting about an incident.
This type of system can work in finding out of suspicious
mails and can also provide reliable information on time so
that appropriate action can be taken and the crime rate
could reduce.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | April 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4106
3. TRIPLE DATA ENCRYPTION ALGORITHM
TDEA or TDES is Triple Data Encryption Algorithm is
upgraded or enhanced version of DES (Data Encryption
Standard) which is a symmetric cryptographic technique in
which DES is applied to each block three times which
scrambles the plain text to cipher text. TDEA supports key
size of 56,112,168 bits and support block size up to 64 bits.
TDES can be implemented with the help of 2 keysandfrom3
keys as well.
The main process of TDEA is shown in FIG 1. and FIG 2.
The readable text is encrypted with key K1, then again
encrypted with key K2 and finally it gets encrypted again
with key K3 each time the text is encrypted with the key it
gets scrambled further thus protection is increasingatevery
step.
For decrypting the scrambled or encrypted text we simply
perform operation P= DK3 (DK2 (DK1)).
Fig -1: TDEA Encryption
Fig -2: TDEA Encryption
4. PROBLEM STATEMENT
The problem to consider is to detect the mails which are
containing evidence to suspiciouseventsthemainaimof this
software is to make a system that is able to detect activities
which are unethical for the social environment aswell asthe
internet.
During this age, communication through mails are a major
part of organizations and groups themail detectionsoftware
catches the blacklisted words which user have used in their
mails and the message is still delivered to other user but the
administrator also gets notified of the dubious mail words
such as bomb, blast, murder can be blacklisted bytheadmin.
5. CRYPTOGRAPHY TECHNIQUE
Encryption: Encryption is the procedure of transforming
readable text to unreadable form i.e encryption simply
changes plain data block to ciphered text.
Decryption: Decryption is the procedure of transforming
unreadable or scrambled texttoreadableformi.econverting
ciphered block to plain data block.
Cryptographic Techniques are divided in two categories one
is symmetric and other is asymmetric. Symmetric
cryptography involves encryption and decryption with the
same key popular examples are DES, AES, Blowfish.
Asymmetric cryptography involves encryption with public
key and decryption with the receiver’s private key some
popular and widely used examples are SSL and RSA.
Fig-3 Types of Cryptography
6. IMPLEMENTATION DETAILS
Triple Data Encryption Algorithm is implemented in this
system. This system comprises of two components.
1) Employee Component
2) Administrator Component
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | April 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4107
Above two modules are further branched into different
subcategories.
a) Employee Component
i) Employee Registration
ii) Employee Login
iii) Create Mail for Employee
iv) Inbox
v) Sent Box
vi) Discussion Forum/ Employee Forum
b) Administrator Component
i) Administrator Login
ii) Check Suspicious Message
iii) Create Mail
iv) View Employee List
v) Data Dictionary
vi) View Data Dictionary
a) Employee Component: In this module/component
the employee of the organization can issuemessage
to other employees. First the user has to login into
the system user his/her Employee ID and then the
password will be sent to employee’s personal email
id then the user have to enter code in passwordbox.
If anything is found suspicious in sent message the
message will be still sent to other user but the
administrator will also be notified about the
message for further reviewing, the admin can also
view all the users registered within the system.
b) Administrator Component: Administrator
component is the most important part of this
system with this component the administrator can
easily view all the suspicious messages/mail
between the different employees. Admin can view
and edit the data dictionary. The administrator can
issue message to the employee and this message is
encrypted first with the key and then sent to the
employee. Employee has to view the message by
entering the same key used at the time of
encryption process this key shared by the
administrator to the employee, the admin can also
view all the users registered within the system.
6. CONCLUSION
The problem is solved by detecting the mail sent from one
user to another by the investigator account or the
administrator. The Administrator account maintains a data
dictionary which stores the distrustful words, if any mail is
carrying these words then it is reported to theadministrator
of the organization and new words can be added to the data
dictionary by the Administrator.
REFERENCES
[1] Atul Kahate “Cryptography and Network Security” 3rd
edition 2013, ISBN: 9781259029882
[2] Roberta Bragg, Mark Rhodes-Ousley and Keith
Strassberg.“Network Security:TheCompleteReference”
1st edition 2004, ISBN: 9780070586710
[3] Eli Biham, Adi Shamir, “Differential Cryptanalysis of the
Data Encryption Standard” 1993, ISBN: 978-1-4613-
9314-6
[4] Aggelos Kiayias, Serdar Pehlivanoglu, “Encryption for
Digital Content” 52 volume, 2010, ISBN: 978-1-4419-
0043-2
[5] Niels Ferguson,BruceSchneier,“Practical Cryptography”,
2nd edition, 2003, ISBN: 0-471-11709-9

More Related Content

What's hot

Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)Palash Mehar
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Jayanth Dwijesh H P
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
 
Tracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAATracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAAIRJET Journal
 
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmEECJOURNAL
 
Honeywords for Password Security and Management
Honeywords for Password Security and ManagementHoneywords for Password Security and Management
Honeywords for Password Security and ManagementIRJET Journal
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationAM Publications,India
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...IJECEIAES
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONA SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONacijjournal
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notesJayanth Dwijesh H P
 
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C ProgrammingPuneeth Puni
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesJayanth Dwijesh H P
 
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain TechnologyIRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain TechnologyIRJET Journal
 
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsAccess Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsIJMTST Journal
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET Journal
 

What's hot (20)

Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
Gs3612141219
Gs3612141219Gs3612141219
Gs3612141219
 
Tracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAATracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAA
 
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
 
Honeywords for Password Security and Management
Honeywords for Password Security and ManagementHoneywords for Password Security and Management
Honeywords for Password Security and Management
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONA SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
 
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
 
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain TechnologyIRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
 
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsAccess Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network Relationships
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
 

Similar to IRJET- Suspicious Mail Detection

The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...IRJET Journal
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406pradip patel
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406pradip patel
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Pvrtechnologies Nellore
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Techglyphs
 
IRJET- Corporate Message Filtration & Security Via 3-DES
IRJET-  	  Corporate Message Filtration & Security Via 3-DESIRJET-  	  Corporate Message Filtration & Security Via 3-DES
IRJET- Corporate Message Filtration & Security Via 3-DESIRJET Journal
 

Similar to IRJET- Suspicious Mail Detection (20)

Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Paper2
Paper2Paper2
Paper2
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
IRJET- Corporate Message Filtration & Security Via 3-DES
IRJET-  	  Corporate Message Filtration & Security Via 3-DESIRJET-  	  Corporate Message Filtration & Security Via 3-DES
IRJET- Corporate Message Filtration & Security Via 3-DES
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 

Recently uploaded (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 

IRJET- Suspicious Mail Detection

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | April 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4105 Suspicious Mail Detection Madhav Gupta1, Romit Shriwal2, Divyansh Negi3, Devarshi Pandey4, Asst Prof Ms. Shikha Rai5 1,2,3,4B.Tech Student, Dept. of Information Technology, Dr. Akilesh Das Gupta Institute of Technology and Management Delhi 5Mentor: Assistant Professor Ms. Shikha Rai, Dept. of Information Technology, Dr. Akhilesh Das Gupta Institute of Technology and Management, Delhi-110053 --------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Over the past two decades email have become one of the most important and widely used means of communication in various organization and in our personal lives but email has also been used in variousorganized attacks around the world so there is a need in inspecting the suspicious mail wehaveutilizedsomecryptographicstrategies for electronic mail detection. Security hasgreatsignificancein the world of Internet and for communication. Triple Data encryption algorithm is a symmetric-key encryption method that provides reliability and safetyincommunication. Byusing a Triple Data Encryption Algorithm, the security has been improved which is very crucial and necessary in the field of email and world wide web. Key Words: Decryption, Encryption, TDEA, 3DES, Cipher Text 1. INTRODUCTION Electronic Mail or E-Mail is amongst the fastest means of communication it is mainly used for formal as well informal communication. E-Mailsareoftenusedtocommunicatetoan individual or group of people, people use E-Mail because its quick, free and easy to use for this reasons email has quickly become a source of suspicious activity such as terrorism, frauds and other malicious activity over the internet. In this research paper we have applied techniques to notice suspicious mails, i.e., associate degree mail that can alert of upcoming unethical events. We have used Triple Data Encryption Algorithm also known as TDEA or Triple-DES (Data Encryption Standard), which focus on a plain text message, when TDEA is used for first time it is used to encrypt the message then the 2nd key is used to decrypt the message which was encrypted. (Because the 2nd key is not a proper key, the data gets scrambled further) then the message which has been scrambled twice is encryptedagain with 1st key to give the last ciphered message. This procedure which is done in 3 steps is known as TDES, Triple DES is a type of DES which is done 3 times by using 2 keys in a certain order. (TDEA can also use 3 different keys instead of only using 2. In both the cases the result is 2^112 key space). A pre-emptive approach to solving bribery,con,terrorismor any other activity harming the society for an organization would be to detect it. Since most of these activities are carried out via an organized approach, hence, they require communication among different members. Electronic mailing systems in organizations is the most common and well-known communication link for the cons or malicious users. Suspicious mail detection helps the admins or the analysts to effectively spot suspicious communication and take the required actions ahead of the hazard and also in- time alert is sent to the admin. In this research paper, we will identify the unethical mails which users send from the system who are registered. The new users get registered first and then they send mail to other registered users and after that theycanviewmessages from the other users. Triple Data Encryption Algorithm is used by the administrator to encrypt messages which are being sent to the users and administrator can also view and send warnings about the suspicious activities if found. For this system to work, we use a data dictionary to identify the words which raise the suspicion. Words suchasrobbery, bribe which are not used in every day to day conversationor messages. 2. Suspicious Mail Detection Suspicious mail detection is a type of system by which suspected users are detected by identifying the types of words he/she uses. Words can be as hijacking, explosion which can be found in their mails which they send to others. These kinds of mails are then checked bytheadminandthen the admin can figure out the identityoftheseuserswhohave sent these mails. This type of system will work in finding unethical elements. This will also provide better security to the system who decides to adapt it. This can also work in Law Enforcement, and other branch of government offices to monitor of any suspicious activity. This system canprovideinformation and reporting about an incident. This type of system can work in finding out of suspicious mails and can also provide reliable information on time so that appropriate action can be taken and the crime rate could reduce.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | April 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4106 3. TRIPLE DATA ENCRYPTION ALGORITHM TDEA or TDES is Triple Data Encryption Algorithm is upgraded or enhanced version of DES (Data Encryption Standard) which is a symmetric cryptographic technique in which DES is applied to each block three times which scrambles the plain text to cipher text. TDEA supports key size of 56,112,168 bits and support block size up to 64 bits. TDES can be implemented with the help of 2 keysandfrom3 keys as well. The main process of TDEA is shown in FIG 1. and FIG 2. The readable text is encrypted with key K1, then again encrypted with key K2 and finally it gets encrypted again with key K3 each time the text is encrypted with the key it gets scrambled further thus protection is increasingatevery step. For decrypting the scrambled or encrypted text we simply perform operation P= DK3 (DK2 (DK1)). Fig -1: TDEA Encryption Fig -2: TDEA Encryption 4. PROBLEM STATEMENT The problem to consider is to detect the mails which are containing evidence to suspiciouseventsthemainaimof this software is to make a system that is able to detect activities which are unethical for the social environment aswell asthe internet. During this age, communication through mails are a major part of organizations and groups themail detectionsoftware catches the blacklisted words which user have used in their mails and the message is still delivered to other user but the administrator also gets notified of the dubious mail words such as bomb, blast, murder can be blacklisted bytheadmin. 5. CRYPTOGRAPHY TECHNIQUE Encryption: Encryption is the procedure of transforming readable text to unreadable form i.e encryption simply changes plain data block to ciphered text. Decryption: Decryption is the procedure of transforming unreadable or scrambled texttoreadableformi.econverting ciphered block to plain data block. Cryptographic Techniques are divided in two categories one is symmetric and other is asymmetric. Symmetric cryptography involves encryption and decryption with the same key popular examples are DES, AES, Blowfish. Asymmetric cryptography involves encryption with public key and decryption with the receiver’s private key some popular and widely used examples are SSL and RSA. Fig-3 Types of Cryptography 6. IMPLEMENTATION DETAILS Triple Data Encryption Algorithm is implemented in this system. This system comprises of two components. 1) Employee Component 2) Administrator Component
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | April 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4107 Above two modules are further branched into different subcategories. a) Employee Component i) Employee Registration ii) Employee Login iii) Create Mail for Employee iv) Inbox v) Sent Box vi) Discussion Forum/ Employee Forum b) Administrator Component i) Administrator Login ii) Check Suspicious Message iii) Create Mail iv) View Employee List v) Data Dictionary vi) View Data Dictionary a) Employee Component: In this module/component the employee of the organization can issuemessage to other employees. First the user has to login into the system user his/her Employee ID and then the password will be sent to employee’s personal email id then the user have to enter code in passwordbox. If anything is found suspicious in sent message the message will be still sent to other user but the administrator will also be notified about the message for further reviewing, the admin can also view all the users registered within the system. b) Administrator Component: Administrator component is the most important part of this system with this component the administrator can easily view all the suspicious messages/mail between the different employees. Admin can view and edit the data dictionary. The administrator can issue message to the employee and this message is encrypted first with the key and then sent to the employee. Employee has to view the message by entering the same key used at the time of encryption process this key shared by the administrator to the employee, the admin can also view all the users registered within the system. 6. CONCLUSION The problem is solved by detecting the mail sent from one user to another by the investigator account or the administrator. The Administrator account maintains a data dictionary which stores the distrustful words, if any mail is carrying these words then it is reported to theadministrator of the organization and new words can be added to the data dictionary by the Administrator. REFERENCES [1] Atul Kahate “Cryptography and Network Security” 3rd edition 2013, ISBN: 9781259029882 [2] Roberta Bragg, Mark Rhodes-Ousley and Keith Strassberg.“Network Security:TheCompleteReference” 1st edition 2004, ISBN: 9780070586710 [3] Eli Biham, Adi Shamir, “Differential Cryptanalysis of the Data Encryption Standard” 1993, ISBN: 978-1-4613- 9314-6 [4] Aggelos Kiayias, Serdar Pehlivanoglu, “Encryption for Digital Content” 52 volume, 2010, ISBN: 978-1-4419- 0043-2 [5] Niels Ferguson,BruceSchneier,“Practical Cryptography”, 2nd edition, 2003, ISBN: 0-471-11709-9