Submit Search
Upload
IRJET- Suspicious Mail Detection
•
0 likes
•
12 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i4/IRJET-V6I4901.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
IRJET Journal
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
Vishal Kumar
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET Journal
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
IRJET Journal
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
Jayanth Dwijesh H P
Final report
Final report
Rahul Sihag
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
Jayanth Dwijesh H P
Recommended
IRJET- A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
IRJET Journal
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
Vishal Kumar
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET Journal
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
IRJET Journal
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
Jayanth Dwijesh H P
Final report
Final report
Rahul Sihag
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
Jayanth Dwijesh H P
Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)
Palash Mehar
Thesis presentation
Thesis presentation
Aboul Ella Hassanien
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
Jayanth Dwijesh H P
Network Security CS2
Network Security CS2
Infinity Tech Solutions
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
Jayanth Dwijesh H P
Gs3612141219
Gs3612141219
IJERA Editor
Tracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAA
IRJET Journal
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
EECJOURNAL
Honeywords for Password Security and Management
Honeywords for Password Security and Management
IRJET Journal
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
AM Publications,India
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
IJECEIAES
Enhanced Security Through Token
Enhanced Security Through Token
IRJET Journal
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
acijjournal
Ijcnc050205
Ijcnc050205
IJCNCJournal
Network security 10EC832 vtu notes
Network security 10EC832 vtu notes
Jayanth Dwijesh H P
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
Puneeth Puni
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
Jayanth Dwijesh H P
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET Journal
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network Relationships
IJMTST Journal
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
IRJET Journal
Public key cryptography
Public key cryptography
Lilies DLiestyowati
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree ...
IRJET Journal
More Related Content
What's hot
Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)
Palash Mehar
Thesis presentation
Thesis presentation
Aboul Ella Hassanien
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
Jayanth Dwijesh H P
Network Security CS2
Network Security CS2
Infinity Tech Solutions
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
Jayanth Dwijesh H P
Gs3612141219
Gs3612141219
IJERA Editor
Tracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAA
IRJET Journal
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
EECJOURNAL
Honeywords for Password Security and Management
Honeywords for Password Security and Management
IRJET Journal
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
AM Publications,India
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
IJECEIAES
Enhanced Security Through Token
Enhanced Security Through Token
IRJET Journal
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
acijjournal
Ijcnc050205
Ijcnc050205
IJCNCJournal
Network security 10EC832 vtu notes
Network security 10EC832 vtu notes
Jayanth Dwijesh H P
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
Puneeth Puni
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
Jayanth Dwijesh H P
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET Journal
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network Relationships
IJMTST Journal
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
IRJET Journal
What's hot
(20)
Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)
Thesis presentation
Thesis presentation
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
Network Security CS2
Network Security CS2
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
Gs3612141219
Gs3612141219
Tracking Spam Mails Using SPRT Algorithm With AAA
Tracking Spam Mails Using SPRT Algorithm With AAA
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
Honeywords for Password Security and Management
Honeywords for Password Security and Management
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
Enhanced Security Through Token
Enhanced Security Through Token
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
Ijcnc050205
Ijcnc050205
Network security 10EC832 vtu notes
Network security 10EC832 vtu notes
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
IRJET- A Secure File Storage & Retrieval using Blockchain Technology
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network Relationships
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
Similar to IRJET- Suspicious Mail Detection
Public key cryptography
Public key cryptography
Lilies DLiestyowati
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree ...
IRJET Journal
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
pradip patel
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
pradip patel
IRJET- Security from Threats of Computer System
IRJET- Security from Threats of Computer System
IRJET Journal
Paper2
Paper2
Vikas Khairnar
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
YogeshIJTSRD
RSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
Universitas Pembangunan Panca Budi
DES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET Journal
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
INFOGAIN PUBLICATION
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
Techglyphs
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
International Journal of Engineering Inventions www.ijeijournal.com
IRJET- Corporate Message Filtration & Security Via 3-DES
IRJET- Corporate Message Filtration & Security Via 3-DES
IRJET Journal
Similar to IRJET- Suspicious Mail Detection
(20)
Public key cryptography
Public key cryptography
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree ...
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
IRJET- Security from Threats of Computer System
IRJET- Security from Threats of Computer System
Paper2
Paper2
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
RSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
DES- Data Encryption Standard
DES- Data Encryption Standard
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
IRJET- Corporate Message Filtration & Security Via 3-DES
IRJET- Corporate Message Filtration & Security Via 3-DES
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Call Girls in Nagpur High Profile
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Kamal Acharya
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
JuliansyahHarahap1
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
DineshKumar4165
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Quintin Balsdon
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
NFPA 5000 2024 standard .
NFPA 5000 2024 standard .
DerechoLaboralIndivi
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
NANDHAKUMARA10
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
bhaskargani46
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
RishantSharmaFr
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
University management System project report..pdf
University management System project report..pdf
Kamal Acharya
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
RagavanV2
Recently uploaded
(20)
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
NFPA 5000 2024 standard .
NFPA 5000 2024 standard .
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
University management System project report..pdf
University management System project report..pdf
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
IRJET- Suspicious Mail Detection
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | April 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4105 Suspicious Mail Detection Madhav Gupta1, Romit Shriwal2, Divyansh Negi3, Devarshi Pandey4, Asst Prof Ms. Shikha Rai5 1,2,3,4B.Tech Student, Dept. of Information Technology, Dr. Akilesh Das Gupta Institute of Technology and Management Delhi 5Mentor: Assistant Professor Ms. Shikha Rai, Dept. of Information Technology, Dr. Akhilesh Das Gupta Institute of Technology and Management, Delhi-110053 --------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Over the past two decades email have become one of the most important and widely used means of communication in various organization and in our personal lives but email has also been used in variousorganized attacks around the world so there is a need in inspecting the suspicious mail wehaveutilizedsomecryptographicstrategies for electronic mail detection. Security hasgreatsignificancein the world of Internet and for communication. Triple Data encryption algorithm is a symmetric-key encryption method that provides reliability and safetyincommunication. Byusing a Triple Data Encryption Algorithm, the security has been improved which is very crucial and necessary in the field of email and world wide web. Key Words: Decryption, Encryption, TDEA, 3DES, Cipher Text 1. INTRODUCTION Electronic Mail or E-Mail is amongst the fastest means of communication it is mainly used for formal as well informal communication. E-Mailsareoftenusedtocommunicatetoan individual or group of people, people use E-Mail because its quick, free and easy to use for this reasons email has quickly become a source of suspicious activity such as terrorism, frauds and other malicious activity over the internet. In this research paper we have applied techniques to notice suspicious mails, i.e., associate degree mail that can alert of upcoming unethical events. We have used Triple Data Encryption Algorithm also known as TDEA or Triple-DES (Data Encryption Standard), which focus on a plain text message, when TDEA is used for first time it is used to encrypt the message then the 2nd key is used to decrypt the message which was encrypted. (Because the 2nd key is not a proper key, the data gets scrambled further) then the message which has been scrambled twice is encryptedagain with 1st key to give the last ciphered message. This procedure which is done in 3 steps is known as TDES, Triple DES is a type of DES which is done 3 times by using 2 keys in a certain order. (TDEA can also use 3 different keys instead of only using 2. In both the cases the result is 2^112 key space). A pre-emptive approach to solving bribery,con,terrorismor any other activity harming the society for an organization would be to detect it. Since most of these activities are carried out via an organized approach, hence, they require communication among different members. Electronic mailing systems in organizations is the most common and well-known communication link for the cons or malicious users. Suspicious mail detection helps the admins or the analysts to effectively spot suspicious communication and take the required actions ahead of the hazard and also in- time alert is sent to the admin. In this research paper, we will identify the unethical mails which users send from the system who are registered. The new users get registered first and then they send mail to other registered users and after that theycanviewmessages from the other users. Triple Data Encryption Algorithm is used by the administrator to encrypt messages which are being sent to the users and administrator can also view and send warnings about the suspicious activities if found. For this system to work, we use a data dictionary to identify the words which raise the suspicion. Words suchasrobbery, bribe which are not used in every day to day conversationor messages. 2. Suspicious Mail Detection Suspicious mail detection is a type of system by which suspected users are detected by identifying the types of words he/she uses. Words can be as hijacking, explosion which can be found in their mails which they send to others. These kinds of mails are then checked bytheadminandthen the admin can figure out the identityoftheseuserswhohave sent these mails. This type of system will work in finding unethical elements. This will also provide better security to the system who decides to adapt it. This can also work in Law Enforcement, and other branch of government offices to monitor of any suspicious activity. This system canprovideinformation and reporting about an incident. This type of system can work in finding out of suspicious mails and can also provide reliable information on time so that appropriate action can be taken and the crime rate could reduce.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | April 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4106 3. TRIPLE DATA ENCRYPTION ALGORITHM TDEA or TDES is Triple Data Encryption Algorithm is upgraded or enhanced version of DES (Data Encryption Standard) which is a symmetric cryptographic technique in which DES is applied to each block three times which scrambles the plain text to cipher text. TDEA supports key size of 56,112,168 bits and support block size up to 64 bits. TDES can be implemented with the help of 2 keysandfrom3 keys as well. The main process of TDEA is shown in FIG 1. and FIG 2. The readable text is encrypted with key K1, then again encrypted with key K2 and finally it gets encrypted again with key K3 each time the text is encrypted with the key it gets scrambled further thus protection is increasingatevery step. For decrypting the scrambled or encrypted text we simply perform operation P= DK3 (DK2 (DK1)). Fig -1: TDEA Encryption Fig -2: TDEA Encryption 4. PROBLEM STATEMENT The problem to consider is to detect the mails which are containing evidence to suspiciouseventsthemainaimof this software is to make a system that is able to detect activities which are unethical for the social environment aswell asthe internet. During this age, communication through mails are a major part of organizations and groups themail detectionsoftware catches the blacklisted words which user have used in their mails and the message is still delivered to other user but the administrator also gets notified of the dubious mail words such as bomb, blast, murder can be blacklisted bytheadmin. 5. CRYPTOGRAPHY TECHNIQUE Encryption: Encryption is the procedure of transforming readable text to unreadable form i.e encryption simply changes plain data block to ciphered text. Decryption: Decryption is the procedure of transforming unreadable or scrambled texttoreadableformi.econverting ciphered block to plain data block. Cryptographic Techniques are divided in two categories one is symmetric and other is asymmetric. Symmetric cryptography involves encryption and decryption with the same key popular examples are DES, AES, Blowfish. Asymmetric cryptography involves encryption with public key and decryption with the receiver’s private key some popular and widely used examples are SSL and RSA. Fig-3 Types of Cryptography 6. IMPLEMENTATION DETAILS Triple Data Encryption Algorithm is implemented in this system. This system comprises of two components. 1) Employee Component 2) Administrator Component
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | April 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4107 Above two modules are further branched into different subcategories. a) Employee Component i) Employee Registration ii) Employee Login iii) Create Mail for Employee iv) Inbox v) Sent Box vi) Discussion Forum/ Employee Forum b) Administrator Component i) Administrator Login ii) Check Suspicious Message iii) Create Mail iv) View Employee List v) Data Dictionary vi) View Data Dictionary a) Employee Component: In this module/component the employee of the organization can issuemessage to other employees. First the user has to login into the system user his/her Employee ID and then the password will be sent to employee’s personal email id then the user have to enter code in passwordbox. If anything is found suspicious in sent message the message will be still sent to other user but the administrator will also be notified about the message for further reviewing, the admin can also view all the users registered within the system. b) Administrator Component: Administrator component is the most important part of this system with this component the administrator can easily view all the suspicious messages/mail between the different employees. Admin can view and edit the data dictionary. The administrator can issue message to the employee and this message is encrypted first with the key and then sent to the employee. Employee has to view the message by entering the same key used at the time of encryption process this key shared by the administrator to the employee, the admin can also view all the users registered within the system. 6. CONCLUSION The problem is solved by detecting the mail sent from one user to another by the investigator account or the administrator. The Administrator account maintains a data dictionary which stores the distrustful words, if any mail is carrying these words then it is reported to theadministrator of the organization and new words can be added to the data dictionary by the Administrator. REFERENCES [1] Atul Kahate “Cryptography and Network Security” 3rd edition 2013, ISBN: 9781259029882 [2] Roberta Bragg, Mark Rhodes-Ousley and Keith Strassberg.“Network Security:TheCompleteReference” 1st edition 2004, ISBN: 9780070586710 [3] Eli Biham, Adi Shamir, “Differential Cryptanalysis of the Data Encryption Standard” 1993, ISBN: 978-1-4613- 9314-6 [4] Aggelos Kiayias, Serdar Pehlivanoglu, “Encryption for Digital Content” 52 volume, 2010, ISBN: 978-1-4419- 0043-2 [5] Niels Ferguson,BruceSchneier,“Practical Cryptography”, 2nd edition, 2003, ISBN: 0-471-11709-9
Download now