SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2474
The Detection of Suspicious Email Based on Decision Tree
Samruddhi Rane 1, Gargi Moholkar 2, Kajal Yerunkar 3, Prof. Nilima Nikam 4
1,2,3 B.E. Students, Department of Computer Engineering, Yadavrao Tasgaonkar Institute Of Engineering And
Technology, Bhivpuri Road, Karjat,
4 Professor, Department of Computer Engineering, Yadavrao Tasgaonkar Institute Of Engineering And
Technology, Bhivpuri Road, Karjat,
Mumbai University, Maharashtra,India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - There are many places where we have localarea
networks and many people using them as per their own needs.
In such conditions, we have to closely monitor the computers.
Many a times, there comes a situation when we need to lock
the resources such as drives, foldersorfilesonthesecomputers
to restrict the users of making use of them.Sometimes weneed
to stop the users from using the internet or from changing the
setting or accessing the registry editor so as to secure the
systems from any crash due to misuse of it. These are the
common task that we do in our day to day life but for this we
don’t have utility software. The aim of this project istosuspect
the E-mails which consist of offensive, anti-socialelementsand
block them which help in identifyingthesuspicioususer. Inthis
project, suspicious users are identified by determining the
keywords used by him/her. The keywords such as bomb, RDX,
are found in the mails which are sent by the user. All these
blocked mails are checked by the administrator and identify
the users who sent this mail. This is very useful in real-time
scenario in which you can resume the Criminal activities.
Key Words: secure the systems,suspecttheE-mails,block,
suspicious users, Criminal activities
1. INTRODUCTION
The idea behind selecting in-house project is to develop
software which gives wider scopeto express our knowledge.
Email has been an efficient and popular ,work done by
various researches suggests that deceptive writing is
characterized by reduced frequency of first personpronouns
and exclusive words and elevated frequency of negative
emotion words and action verbs. In many security
informatics applications it is frequency of first-person
pronouns and exclusive important to detect deceptive
communication in email. We apply this modelofdeceptionto
the set of Email .The rules generated are used to test the
email as deceptive or not. In particular we are interested in
detecting emails about criminalactivities. Afterclassification
wemust be able to differentiatetheemailsgivinginformation
about past criminal activities (Informative email) and those
acting as alerts (warnings) for the future criminal activities.
This differentiation is doneusingthefeaturesconsideringthe
tense used in the emails. Experimental results show that
simple associative classifier provides promising detection
rates.
Our purpose is to develop software that can be used:
1. To find a system that identifies deception in Email
through communication.
2. Classified deceptive Email.
3. After classification of deceptive Email, we must
classify them into informative Emails and alert
Emails.
Concern about National security has increased since the
terrorist attack on September 2001.The CIA, FBI and other
federal agencies are actively collecting domestic and foreign
intelligence to prevent future attacks. These efforts have in
turn motivated us to collect data's and undertake this paper
work as a challenge. Data mining is a powerful tool that
enables criminal investigators who may lack extensive
training as data analyst to explore large databases quickly
and efficiently. Computers can process thousands of
instructions in seconds, saving precious time. In addition,
installing and running software often costs less than hiring
and training personality. To our knowledge, the firstattempt
to apply Association rule mining to task of suspicious Email
Detection (Emailsabout criminal activities). The reasonthey
have eluded conclusion extracting the informative emails
using the tense (Past tense) of the verbs used in the emails.
Apart from the informative emails, other emails are
considered as the alerting emails for the future occurrences
of hazardous activities.
Objective is to protect the security and morale of nation
which is being broken down due to the constant attack and
threat on the people of our nation. This project helps us to
detect the emails sent by the people on internet which can
harm out integrity. By the use of this technique, the emails
can be found out in a manner which can inform us about past
activities as well as alert us about the future activities. Hence
it can be used in cyber investigation for the security from
suspicious emails.
1.1 Existing System
Aniruddha Kshirsagar and Hanmant N. Renushe
proposed that various data mining techniques can be usedto
overcome the critical issue of identity fraud. They proposed
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2475
that data mining can be used in almost every field to detect
the frauds and crimes in various domains.
Few other authors have also applied ID3 algorithm to
detect the suspicious e- mails by considering the keyword
base approach.
Disadvantages:
• No proper identification of deceptive emails.
• The problem with this approach was that they have
not used any information about the context of the
identified keywords from the e-mails.
1.2 Proposed System
The proposed system is developed in Microsoft
Visual Studio 2010 using ID3 ClassificationAlgorithm.Atthe
back end MySQL Server has been used and an input file has
been created for the training sample set of e-mails. Some
rules are provided by the new Decision Tree which further
are used to detect that a particular e-mail is Suspicious or
not. This application is platform independent.Itisanonclick
application which once implemented through Visual Studio
does not require any kind of software. The functioning is
very simple and user friendly.
The proposed system initially extracts some useful
features such as “suspicious keywords” and “non-suspicious
indicators” from the e-mail message. Then the combination
of those keywords and indicators are analyzed. If suspicious
keywords are present in an e-mail without any non-
suspicious indicator, the e-mail will be detected as
suspicious and the threat of a potential futureterrorist event
will be reflected. If some suspicious keywords are present
with others i.e., non-suspicious indicators, then the e- mail
will be further classified as “may-be- suspicious” because it
might be the case of an e-mail in which peoplediscussespast
events, maybe for condolence, sympathy and so on. In this
tool, the features will be extracted along with the context.
For example, take a samplee-mail suchas:“Itisvery
sad that you couldn't save yourfamilyfromthebombblasts.”
In the e-mail message, the suspicious keywords “blasts” and
“bomb” are present but they do not reflects a futureterrorist
activity due to the presence of another feature “sad”.
ID3 Decision tree algorithm has been used to
classify the records. Algorithm starts with a training set T =
{mail1, mail2, mail3…mail n} and class label is Suspicious =
{Yes, No, Maybe}. Each e-mail is provided a label. The
purpose is to develop a tool that observes the patterns from
the training sample set and is able to classify a new test
sample e-mail as suspicious, non-suspicious or may-be-
suspicious. Algorithm extracts the SuspiciousKeywordsand
the Non-Suspicious Indicators which were present in the
training sample set of e-mails.
While constructing the Tree, at start, all the
suspicious keywords are at the root. Then those are
partitioned recursively based on selected attributes which
are selected on the basis of the information gain after
attribute- importance. The new algorithm through
introducing attribute -importance emphasizes on the
attributes with less values but higher importance, rather
than the attributes with more values and lower importance.
Further partitioning is stopped when there are no
remaining attributes for further partitioning i.e. majority
voting is employed for classifying the leaf or there are no
samples left.
For all the attributes, the attribute- importance is
calculated. The attribute which has the highest importance
becomes the root node of the tree. This process goesonuntil
all the attributes are mapped in to the tree based on the
sorted attribute - importance. Following the each individual
path in the tree, the rules are generated. The output of this
module is Decision tree and Rules.
1.3 E- MAIL
Electronic mail, also known as email is a method of
exchanging digital messages from an author to one or more
recipients. Modern email operates across the Internet or
other computernetworks.Someearlyemailsystemsrequired
that the author and the recipient both be online at the same
time, in common with instant messaging. Today's email
systems are based on a store-and-forward model.
Email servers accept, forward, deliver and store messages.
Neither the users nor their computers are required to be
online simultaneously; they need connect only briefly,
typically to an email server, for as long as it takes to send or
receive messages.
An Internetemailmessages consistsofthreecomponents,the
message envelope, the message header, and the
message body. The message header contains control
information, including, minimally, an originator's email
address and one or more recipient addresses. Usually
descriptive information is also added, such as a subject
header field and a message submission date/time stamp.
1.4 Read Email Using IMAP
Internet Message Access Protocol (IMAP) is one of the two
most prevalent Internet standard protocols for e-
mail retrieval, the other being the Post Office Protocol(POP).
Virtually all modern e-mail clients and mail servers support
both protocols as a means of transferring e-mail messages
from a server.
The Internet Message Access Protocol (commonly
known as IMAP) is an Application Layer Internet protocol
that allows an e-mail client toaccess e-mail on aremote mail
server. The current version, IMAP version 4 revision 1
(IMAP4rev1), is defined by RFC 3501. An IMAP server
typically listens on well-known port 143. IMAP
over SSL (IMAPS) is assigned well-known port number 993.
IMAP supports both on-line and off-line modes of operation.
E-mail clients using IMAP generally leave messages on the
server until the user explicitly deletes them. This
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2476
and other characteristics of IMAP operation allow multiple
clients to manage the same mailbox. Most e-
mail clients support IMAP in addition to POP to retrieve
messages; however, fewer e-mail services support IMAP.
IMAP offers access to the mail storage.ss Incoming e-mail
messagesare sent to an e-mail server that storesmessagesin
the recipient's e-mail box. The user retrieves the messages
with an e-mail client that uses one of a number of e-mail
retrieval protocols. Some clients and servers preferentially
use vendor-specific, proprietary protocols, but mostsupport
the Internet standardprotocols, SMTP forsendinge-mailand
POP and IMAP forretrievinge-mail,allowinginteroperability
with other servers and clients. For
example, Microsoft's Outlook client uses a proprietary
protocol to communicate with a Microsoft Exchange
Server server as does IBM's Notes client when
communicating with a Domino server, but all of these
products also support POP, IMAP, and outgoing SMTP.
Support for the Internet standard protocols allows many e-
mail clients such as Pegasus Mail or Mozilla Thunderbird to
access these servers, and allows the clients to be used with
other servers (see list of mail servers).
2. ID3 ALGORITHM
The ID3 algorithm begins with the original set S as the root
node. On each iteration of the algorithm, it iterates through
every unused attribute of the setSandcalculatestheentropy
H(S) (or information gain IG(S)) of that attribute. It then
selects the attribute which has the smallest entropy (or
largest information gain) value. The set S is then split by the
selected attribute to produce subsets of the data. The
algorithm continues to recurs on each subset, considering
only attributes never selected before.
Recursion on a subset may stop in one of these cases:
 every element in the subset belongs to the same
class (+ or -), then the node is turned into a leaf and
labelled with the class of the examples
 there are no more attributes to be selected, but the
examples still do not belong to thesameclass(some
are + and some are -), then the node is turned into a
leaf and labelled with the most common class of the
examples in the subset
 there are no examples in the subset, this happens
when no example in the parent set was found to be
matching a specific value of the selected attribute
Throughout the algorithm, the decision tree is constructed
with each non-terminal node representing the selected
attribute on which the data was split, and terminal nodes
representing the class label of the final subset of thisbranch.
The main process of id3 algorithm is:
 Calculate the entropy of every attribute using the
data set S
 Split the set S into subsets using the attribute for
which the resulting entropy (after splitting) is
minimum (or equivalently, information gain is
maximum)
 Make a decision tree node containing that attribute
 Recurs on subsets using remaining attributes
3. LITERATURE SURVEY
Aniruddha Kshirsagar et al. [3] and Hanmant N. Renushe et
al. [4] proposed that various data mining techniques can be
used to overcome the critical issue of identity fraud. They
proposed that data mining can be used in almost every field
to detect the frauds and crimes in various domains. P. S.
Kaila and Skillicon [8] proposed an approach for detecting
the suspicious and deceptive e-mails which is dependent on
the singular value decomposition method.Theproblemwith
this approach was that it does not deal with incomplete data
in a proper efficient way and cannot maintain the new data
incrementally. For updating the new data properly they had
to reprocess the entire algorithm. S. Kiritchenko et al. [9]
projected a good performance minimizing the Classification
error in an e-mail sequence by observing temporal relations
and embedding the discovered information into content-
based learning methods. Approach to Anomalous e-mail
detection is considered. Z. Huang et al. [12] showed
approaches to detect anomalous e-mail and involved the
deployment of data mining techniques.
Few other authors [6] have also applied ID3 algorithm to
detect the suspicious e- mails by considering the keyword
base approach. The problem with this approach was that
they have not used any information about the context of the
identified keywords from the e-mails. Then S. Appavu & R.
Rajaram [10] have used the association rule mining to
further classify the suspicious e-mails into different
specialized classes. This system decides whether the e-mail
message can be classified as suspicious alert if there is
suspicious keyword present in the future tense or else it is
classified as suspicious information only.
4. SYSTEM REQUIREMENT
4.1 Software Requirements
 O/S : Windows XP.
 Language : .net, C#
 IDE : Microsoft Visual Studio 2010
 Data Base : MySQL
4.2 Hardware Requirements
 System : Pentium IV 2.4 GHz
 Hard Disk : 16 GB
 Ram : 512MB
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2477
5. SCREENSHOTS
Screenshot - 1: Users login
Screenshot - 2: Inbox
Screenshot – 3: Check Mail 1 (Alert Mail)
Screenshot - 4: Check Mail 2 (Informative Mail)
Screenshot - 5: Compose New Mail
6. APPLICATIONS
Our developed software can be used:
 In crime branch to detect the suspicious mails & to
get alert of several attacks.
 In Army, to give alert of attacks & blast.
 To provide security against cyber crime.
7. CONCLUSION
We have deployed decision tree based classification
approach to detect deceptive communication in email
text as informative or alert emails. We can find it thatthe
ID3 algorithmcanprovidesbetterclassificationresultfor
suspicious email detection.
The Proposed work (using keyword extraction and
keyword attribute called tense) will be helpful for
identifying the deceptive email and to get information in
time to take effective actions to reduce criminal
activities.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2478
REFERENCES
[1] Mugdha Sharma, “Z - CRIME: A datamining
tool for the detection of suspicious criminal
activities based on decision tree”, International
Conference on Data Mining and Intelligent
Computing (ICDMIC), 2014.
[2] Keyvanpour, Javideh, et al., “Detecting and
investigating crime by means of data mining: a
general crime matching framework”, World
Conference on Information Technology,ElsvierB.V.,
2010.
[3] Aniruddha Kshirsagar & Lalit Dole , “A
review on data mining methods for identity crime
detection”, International Journal of Electrical,
Electronics and Computer Systems (IJEECS),
January, 2014.
[4] N. Hanmant Renushe, R. Prasanna Rasal &
S. Abhijit Desai, “Data mining practices for effective
investigation of crime”, IJCTA, May-June 2012.
[5] T. Abraham and de Vel, O., “Investigative
profiling with computer forensic log data and
association rules”, Data Mining, Proceedings, IEEE
International Conference, 2002.
[6] S. Appavvu, Muthu Pandian, et al.,
“Association Rule Mining for Suspicious Email
Detection: A Data Mining Approach”, Intelligence
and Security Informatics, IEEE, 2007.
[7] M. Mansourvar, et al., “A computer- Based
System to Support Intelligent Forensic Study”,
Computational Intelligence, Modelling and
Simulation (CIMSiM), Fourth International
Conference, IEEE, September 2012.
[8] P.S.Keila,D.B.Skillicorn,“DetectingUnusual
and Deceptive Communication in Email”, Centers
for Advanced Studies Conference, June 2005.
[9] S. Kiritchenko, S. Matwin, S. Abu-Hakima,
“Email Classification with Temporal Features”,
Intelligent Information Systems, 2004.
[10] S. Appavu, R. Rajaram, "Association rule
mining for suspicious email detection:a data mining
approach”, In Proceedings of the IEEE International
ConferenceonIntelligenceandSecurityInformatics,
New Jersey, USA, 2007.
[11] Sarwat Nizamani, Nasrullah Memon, et al.,
“Modeling Suspicious Email Detection using
Enhanced Feature Selection”, International Journal
of Modeling and Optimization, Vol. 2, No. 4, August
2012.
[12] Z.Huang, D.D. Zeng, “A Link Prediction
Approach to Anomalous Email Detection”,
Proceedings of the IEEE International Conference
on Systems, Man and Cybernetics, Taipei, Taiwan,
2006.

More Related Content

What's hot

IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado
Mark John Lado, MIT
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
YogeshIJTSRD
 
Aspects Of E Mail As Evidence In India
Aspects Of E Mail As Evidence In IndiaAspects Of E Mail As Evidence In India
Aspects Of E Mail As Evidence In India
Shiva Shankara
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET Journal
 
a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...
a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...
a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...
Manoj895639
 
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET Journal
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
IRJET Journal
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
IJECEIAES
 
IRJET- College Enquiry Chatbot System(DMCE)
IRJET-  	  College Enquiry Chatbot System(DMCE)IRJET-  	  College Enquiry Chatbot System(DMCE)
IRJET- College Enquiry Chatbot System(DMCE)
IRJET Journal
 
The Internet & WWW - Basic Understanding
The Internet & WWW - Basic Understanding The Internet & WWW - Basic Understanding
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
eSAT Publishing House
 
IRJET- College Enquiry Chat-Bot using API.AI
IRJET- College Enquiry Chat-Bot using API.AIIRJET- College Enquiry Chat-Bot using API.AI
IRJET- College Enquiry Chat-Bot using API.AI
IRJET Journal
 
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
IRJET Journal
 
Post-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics InvestigationPost-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics Investigation
Universitas Pembangunan Panca Budi
 
Introduction to Mail Management System
Introduction to Mail Management System Introduction to Mail Management System
Introduction to Mail Management System
IJERA Editor
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
Aboul Ella Hassanien
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
ZTech Proje
 
SULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in IndiaSULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in India
SULTHAN BASHA
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
 

What's hot (20)

IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
Aspects Of E Mail As Evidence In India
Aspects Of E Mail As Evidence In IndiaAspects Of E Mail As Evidence In India
Aspects Of E Mail As Evidence In India
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
 
a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...
a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...
a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...
 
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
B0940509
B0940509B0940509
B0940509
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
 
IRJET- College Enquiry Chatbot System(DMCE)
IRJET-  	  College Enquiry Chatbot System(DMCE)IRJET-  	  College Enquiry Chatbot System(DMCE)
IRJET- College Enquiry Chatbot System(DMCE)
 
The Internet & WWW - Basic Understanding
The Internet & WWW - Basic Understanding The Internet & WWW - Basic Understanding
The Internet & WWW - Basic Understanding
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
 
IRJET- College Enquiry Chat-Bot using API.AI
IRJET- College Enquiry Chat-Bot using API.AIIRJET- College Enquiry Chat-Bot using API.AI
IRJET- College Enquiry Chat-Bot using API.AI
 
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
 
Post-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics InvestigationPost-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics Investigation
 
Introduction to Mail Management System
Introduction to Mail Management System Introduction to Mail Management System
Introduction to Mail Management System
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
 
SULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in IndiaSULTHAN's - ICT-1 for U.G courses in India
SULTHAN's - ICT-1 for U.G courses in India
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 

Similar to The Detection of Suspicious Email Based on Decision Tree

Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsStudy of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
IRJET Journal
 
IRJET- Suspicious Mail Detection
IRJET-  	  Suspicious Mail DetectionIRJET-  	  Suspicious Mail Detection
IRJET- Suspicious Mail Detection
IRJET Journal
 
A Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data ClusteringA Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data Clustering
idescitation
 
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...
IJNSA Journal
 
EMAIL SPAM DETECTION USING HYBRID ALGORITHM
EMAIL SPAM DETECTION USING HYBRID ALGORITHMEMAIL SPAM DETECTION USING HYBRID ALGORITHM
EMAIL SPAM DETECTION USING HYBRID ALGORITHM
IRJET Journal
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
IRJET Journal
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
IJNSA Journal
 
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MININGA LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
Heather Strinden
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
eSAT Publishing House
 
miniproject.ppt.pptx
miniproject.ppt.pptxminiproject.ppt.pptx
miniproject.ppt.pptx
Anush90
 
E-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector MachineE-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector Machine
IRJET Journal
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
Detection of Spam in Emails using Machine Learning
Detection of Spam in Emails using Machine LearningDetection of Spam in Emails using Machine Learning
Detection of Spam in Emails using Machine Learning
IRJET Journal
 
Overview of Anti-spam filtering Techniques
Overview of Anti-spam filtering TechniquesOverview of Anti-spam filtering Techniques
Overview of Anti-spam filtering Techniques
IRJET Journal
 
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
IRJET Journal
 
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection System
IRJET Journal
 
Spam Mail Prediction Report.docx
Spam Mail Prediction Report.docxSpam Mail Prediction Report.docx
Spam Mail Prediction Report.docx
Shubham Jaybhaye
 
VOICE BASED EMAIL SYSTEM
VOICE BASED EMAIL SYSTEMVOICE BASED EMAIL SYSTEM
VOICE BASED EMAIL SYSTEM
IRJET Journal
 
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingIdentification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using Voting
Editor IJCATR
 
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docxRunning header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
jeffsrosalyn
 

Similar to The Detection of Suspicious Email Based on Decision Tree (20)

Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsStudy of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
 
IRJET- Suspicious Mail Detection
IRJET-  	  Suspicious Mail DetectionIRJET-  	  Suspicious Mail Detection
IRJET- Suspicious Mail Detection
 
A Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data ClusteringA Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data Clustering
 
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...
 
EMAIL SPAM DETECTION USING HYBRID ALGORITHM
EMAIL SPAM DETECTION USING HYBRID ALGORITHMEMAIL SPAM DETECTION USING HYBRID ALGORITHM
EMAIL SPAM DETECTION USING HYBRID ALGORITHM
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
 
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MININGA LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
 
miniproject.ppt.pptx
miniproject.ppt.pptxminiproject.ppt.pptx
miniproject.ppt.pptx
 
E-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector MachineE-Mail Spam Detection Using Supportive Vector Machine
E-Mail Spam Detection Using Supportive Vector Machine
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Detection of Spam in Emails using Machine Learning
Detection of Spam in Emails using Machine LearningDetection of Spam in Emails using Machine Learning
Detection of Spam in Emails using Machine Learning
 
Overview of Anti-spam filtering Techniques
Overview of Anti-spam filtering TechniquesOverview of Anti-spam filtering Techniques
Overview of Anti-spam filtering Techniques
 
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
 
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection System
 
Spam Mail Prediction Report.docx
Spam Mail Prediction Report.docxSpam Mail Prediction Report.docx
Spam Mail Prediction Report.docx
 
VOICE BASED EMAIL SYSTEM
VOICE BASED EMAIL SYSTEMVOICE BASED EMAIL SYSTEM
VOICE BASED EMAIL SYSTEM
 
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingIdentification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using Voting
 
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docxRunning header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 

Recently uploaded (20)

Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 

The Detection of Suspicious Email Based on Decision Tree

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2474 The Detection of Suspicious Email Based on Decision Tree Samruddhi Rane 1, Gargi Moholkar 2, Kajal Yerunkar 3, Prof. Nilima Nikam 4 1,2,3 B.E. Students, Department of Computer Engineering, Yadavrao Tasgaonkar Institute Of Engineering And Technology, Bhivpuri Road, Karjat, 4 Professor, Department of Computer Engineering, Yadavrao Tasgaonkar Institute Of Engineering And Technology, Bhivpuri Road, Karjat, Mumbai University, Maharashtra,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - There are many places where we have localarea networks and many people using them as per their own needs. In such conditions, we have to closely monitor the computers. Many a times, there comes a situation when we need to lock the resources such as drives, foldersorfilesonthesecomputers to restrict the users of making use of them.Sometimes weneed to stop the users from using the internet or from changing the setting or accessing the registry editor so as to secure the systems from any crash due to misuse of it. These are the common task that we do in our day to day life but for this we don’t have utility software. The aim of this project istosuspect the E-mails which consist of offensive, anti-socialelementsand block them which help in identifyingthesuspicioususer. Inthis project, suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX, are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent this mail. This is very useful in real-time scenario in which you can resume the Criminal activities. Key Words: secure the systems,suspecttheE-mails,block, suspicious users, Criminal activities 1. INTRODUCTION The idea behind selecting in-house project is to develop software which gives wider scopeto express our knowledge. Email has been an efficient and popular ,work done by various researches suggests that deceptive writing is characterized by reduced frequency of first personpronouns and exclusive words and elevated frequency of negative emotion words and action verbs. In many security informatics applications it is frequency of first-person pronouns and exclusive important to detect deceptive communication in email. We apply this modelofdeceptionto the set of Email .The rules generated are used to test the email as deceptive or not. In particular we are interested in detecting emails about criminalactivities. Afterclassification wemust be able to differentiatetheemailsgivinginformation about past criminal activities (Informative email) and those acting as alerts (warnings) for the future criminal activities. This differentiation is doneusingthefeaturesconsideringthe tense used in the emails. Experimental results show that simple associative classifier provides promising detection rates. Our purpose is to develop software that can be used: 1. To find a system that identifies deception in Email through communication. 2. Classified deceptive Email. 3. After classification of deceptive Email, we must classify them into informative Emails and alert Emails. Concern about National security has increased since the terrorist attack on September 2001.The CIA, FBI and other federal agencies are actively collecting domestic and foreign intelligence to prevent future attacks. These efforts have in turn motivated us to collect data's and undertake this paper work as a challenge. Data mining is a powerful tool that enables criminal investigators who may lack extensive training as data analyst to explore large databases quickly and efficiently. Computers can process thousands of instructions in seconds, saving precious time. In addition, installing and running software often costs less than hiring and training personality. To our knowledge, the firstattempt to apply Association rule mining to task of suspicious Email Detection (Emailsabout criminal activities). The reasonthey have eluded conclusion extracting the informative emails using the tense (Past tense) of the verbs used in the emails. Apart from the informative emails, other emails are considered as the alerting emails for the future occurrences of hazardous activities. Objective is to protect the security and morale of nation which is being broken down due to the constant attack and threat on the people of our nation. This project helps us to detect the emails sent by the people on internet which can harm out integrity. By the use of this technique, the emails can be found out in a manner which can inform us about past activities as well as alert us about the future activities. Hence it can be used in cyber investigation for the security from suspicious emails. 1.1 Existing System Aniruddha Kshirsagar and Hanmant N. Renushe proposed that various data mining techniques can be usedto overcome the critical issue of identity fraud. They proposed
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2475 that data mining can be used in almost every field to detect the frauds and crimes in various domains. Few other authors have also applied ID3 algorithm to detect the suspicious e- mails by considering the keyword base approach. Disadvantages: • No proper identification of deceptive emails. • The problem with this approach was that they have not used any information about the context of the identified keywords from the e-mails. 1.2 Proposed System The proposed system is developed in Microsoft Visual Studio 2010 using ID3 ClassificationAlgorithm.Atthe back end MySQL Server has been used and an input file has been created for the training sample set of e-mails. Some rules are provided by the new Decision Tree which further are used to detect that a particular e-mail is Suspicious or not. This application is platform independent.Itisanonclick application which once implemented through Visual Studio does not require any kind of software. The functioning is very simple and user friendly. The proposed system initially extracts some useful features such as “suspicious keywords” and “non-suspicious indicators” from the e-mail message. Then the combination of those keywords and indicators are analyzed. If suspicious keywords are present in an e-mail without any non- suspicious indicator, the e-mail will be detected as suspicious and the threat of a potential futureterrorist event will be reflected. If some suspicious keywords are present with others i.e., non-suspicious indicators, then the e- mail will be further classified as “may-be- suspicious” because it might be the case of an e-mail in which peoplediscussespast events, maybe for condolence, sympathy and so on. In this tool, the features will be extracted along with the context. For example, take a samplee-mail suchas:“Itisvery sad that you couldn't save yourfamilyfromthebombblasts.” In the e-mail message, the suspicious keywords “blasts” and “bomb” are present but they do not reflects a futureterrorist activity due to the presence of another feature “sad”. ID3 Decision tree algorithm has been used to classify the records. Algorithm starts with a training set T = {mail1, mail2, mail3…mail n} and class label is Suspicious = {Yes, No, Maybe}. Each e-mail is provided a label. The purpose is to develop a tool that observes the patterns from the training sample set and is able to classify a new test sample e-mail as suspicious, non-suspicious or may-be- suspicious. Algorithm extracts the SuspiciousKeywordsand the Non-Suspicious Indicators which were present in the training sample set of e-mails. While constructing the Tree, at start, all the suspicious keywords are at the root. Then those are partitioned recursively based on selected attributes which are selected on the basis of the information gain after attribute- importance. The new algorithm through introducing attribute -importance emphasizes on the attributes with less values but higher importance, rather than the attributes with more values and lower importance. Further partitioning is stopped when there are no remaining attributes for further partitioning i.e. majority voting is employed for classifying the leaf or there are no samples left. For all the attributes, the attribute- importance is calculated. The attribute which has the highest importance becomes the root node of the tree. This process goesonuntil all the attributes are mapped in to the tree based on the sorted attribute - importance. Following the each individual path in the tree, the rules are generated. The output of this module is Decision tree and Rules. 1.3 E- MAIL Electronic mail, also known as email is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computernetworks.Someearlyemailsystemsrequired that the author and the recipient both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to an email server, for as long as it takes to send or receive messages. An Internetemailmessages consistsofthreecomponents,the message envelope, the message header, and the message body. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp. 1.4 Read Email Using IMAP Internet Message Access Protocol (IMAP) is one of the two most prevalent Internet standard protocols for e- mail retrieval, the other being the Post Office Protocol(POP). Virtually all modern e-mail clients and mail servers support both protocols as a means of transferring e-mail messages from a server. The Internet Message Access Protocol (commonly known as IMAP) is an Application Layer Internet protocol that allows an e-mail client toaccess e-mail on aremote mail server. The current version, IMAP version 4 revision 1 (IMAP4rev1), is defined by RFC 3501. An IMAP server typically listens on well-known port 143. IMAP over SSL (IMAPS) is assigned well-known port number 993. IMAP supports both on-line and off-line modes of operation. E-mail clients using IMAP generally leave messages on the server until the user explicitly deletes them. This
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2476 and other characteristics of IMAP operation allow multiple clients to manage the same mailbox. Most e- mail clients support IMAP in addition to POP to retrieve messages; however, fewer e-mail services support IMAP. IMAP offers access to the mail storage.ss Incoming e-mail messagesare sent to an e-mail server that storesmessagesin the recipient's e-mail box. The user retrieves the messages with an e-mail client that uses one of a number of e-mail retrieval protocols. Some clients and servers preferentially use vendor-specific, proprietary protocols, but mostsupport the Internet standardprotocols, SMTP forsendinge-mailand POP and IMAP forretrievinge-mail,allowinginteroperability with other servers and clients. For example, Microsoft's Outlook client uses a proprietary protocol to communicate with a Microsoft Exchange Server server as does IBM's Notes client when communicating with a Domino server, but all of these products also support POP, IMAP, and outgoing SMTP. Support for the Internet standard protocols allows many e- mail clients such as Pegasus Mail or Mozilla Thunderbird to access these servers, and allows the clients to be used with other servers (see list of mail servers). 2. ID3 ALGORITHM The ID3 algorithm begins with the original set S as the root node. On each iteration of the algorithm, it iterates through every unused attribute of the setSandcalculatestheentropy H(S) (or information gain IG(S)) of that attribute. It then selects the attribute which has the smallest entropy (or largest information gain) value. The set S is then split by the selected attribute to produce subsets of the data. The algorithm continues to recurs on each subset, considering only attributes never selected before. Recursion on a subset may stop in one of these cases:  every element in the subset belongs to the same class (+ or -), then the node is turned into a leaf and labelled with the class of the examples  there are no more attributes to be selected, but the examples still do not belong to thesameclass(some are + and some are -), then the node is turned into a leaf and labelled with the most common class of the examples in the subset  there are no examples in the subset, this happens when no example in the parent set was found to be matching a specific value of the selected attribute Throughout the algorithm, the decision tree is constructed with each non-terminal node representing the selected attribute on which the data was split, and terminal nodes representing the class label of the final subset of thisbranch. The main process of id3 algorithm is:  Calculate the entropy of every attribute using the data set S  Split the set S into subsets using the attribute for which the resulting entropy (after splitting) is minimum (or equivalently, information gain is maximum)  Make a decision tree node containing that attribute  Recurs on subsets using remaining attributes 3. LITERATURE SURVEY Aniruddha Kshirsagar et al. [3] and Hanmant N. Renushe et al. [4] proposed that various data mining techniques can be used to overcome the critical issue of identity fraud. They proposed that data mining can be used in almost every field to detect the frauds and crimes in various domains. P. S. Kaila and Skillicon [8] proposed an approach for detecting the suspicious and deceptive e-mails which is dependent on the singular value decomposition method.Theproblemwith this approach was that it does not deal with incomplete data in a proper efficient way and cannot maintain the new data incrementally. For updating the new data properly they had to reprocess the entire algorithm. S. Kiritchenko et al. [9] projected a good performance minimizing the Classification error in an e-mail sequence by observing temporal relations and embedding the discovered information into content- based learning methods. Approach to Anomalous e-mail detection is considered. Z. Huang et al. [12] showed approaches to detect anomalous e-mail and involved the deployment of data mining techniques. Few other authors [6] have also applied ID3 algorithm to detect the suspicious e- mails by considering the keyword base approach. The problem with this approach was that they have not used any information about the context of the identified keywords from the e-mails. Then S. Appavu & R. Rajaram [10] have used the association rule mining to further classify the suspicious e-mails into different specialized classes. This system decides whether the e-mail message can be classified as suspicious alert if there is suspicious keyword present in the future tense or else it is classified as suspicious information only. 4. SYSTEM REQUIREMENT 4.1 Software Requirements  O/S : Windows XP.  Language : .net, C#  IDE : Microsoft Visual Studio 2010  Data Base : MySQL 4.2 Hardware Requirements  System : Pentium IV 2.4 GHz  Hard Disk : 16 GB  Ram : 512MB
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2477 5. SCREENSHOTS Screenshot - 1: Users login Screenshot - 2: Inbox Screenshot – 3: Check Mail 1 (Alert Mail) Screenshot - 4: Check Mail 2 (Informative Mail) Screenshot - 5: Compose New Mail 6. APPLICATIONS Our developed software can be used:  In crime branch to detect the suspicious mails & to get alert of several attacks.  In Army, to give alert of attacks & blast.  To provide security against cyber crime. 7. CONCLUSION We have deployed decision tree based classification approach to detect deceptive communication in email text as informative or alert emails. We can find it thatthe ID3 algorithmcanprovidesbetterclassificationresultfor suspicious email detection. The Proposed work (using keyword extraction and keyword attribute called tense) will be helpful for identifying the deceptive email and to get information in time to take effective actions to reduce criminal activities.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2478 REFERENCES [1] Mugdha Sharma, “Z - CRIME: A datamining tool for the detection of suspicious criminal activities based on decision tree”, International Conference on Data Mining and Intelligent Computing (ICDMIC), 2014. [2] Keyvanpour, Javideh, et al., “Detecting and investigating crime by means of data mining: a general crime matching framework”, World Conference on Information Technology,ElsvierB.V., 2010. [3] Aniruddha Kshirsagar & Lalit Dole , “A review on data mining methods for identity crime detection”, International Journal of Electrical, Electronics and Computer Systems (IJEECS), January, 2014. [4] N. Hanmant Renushe, R. Prasanna Rasal & S. Abhijit Desai, “Data mining practices for effective investigation of crime”, IJCTA, May-June 2012. [5] T. Abraham and de Vel, O., “Investigative profiling with computer forensic log data and association rules”, Data Mining, Proceedings, IEEE International Conference, 2002. [6] S. Appavvu, Muthu Pandian, et al., “Association Rule Mining for Suspicious Email Detection: A Data Mining Approach”, Intelligence and Security Informatics, IEEE, 2007. [7] M. Mansourvar, et al., “A computer- Based System to Support Intelligent Forensic Study”, Computational Intelligence, Modelling and Simulation (CIMSiM), Fourth International Conference, IEEE, September 2012. [8] P.S.Keila,D.B.Skillicorn,“DetectingUnusual and Deceptive Communication in Email”, Centers for Advanced Studies Conference, June 2005. [9] S. Kiritchenko, S. Matwin, S. Abu-Hakima, “Email Classification with Temporal Features”, Intelligent Information Systems, 2004. [10] S. Appavu, R. Rajaram, "Association rule mining for suspicious email detection:a data mining approach”, In Proceedings of the IEEE International ConferenceonIntelligenceandSecurityInformatics, New Jersey, USA, 2007. [11] Sarwat Nizamani, Nasrullah Memon, et al., “Modeling Suspicious Email Detection using Enhanced Feature Selection”, International Journal of Modeling and Optimization, Vol. 2, No. 4, August 2012. [12] Z.Huang, D.D. Zeng, “A Link Prediction Approach to Anomalous Email Detection”, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Taipei, Taiwan, 2006.