Sie sind auf Seite 1von 2

ABSTRACT

Detecting Targeted Malicious Email


This project related to mass generated emails. Some numbers of email systems are not
register in server. These un-authentication email systems are forward the unnecessary mails of
content and store into inbox. These emails are dangerous. These types of emails we are call as
a spam or phishing emails. Previous detection techniques are not performing for detection of
targeted malicious mails. Here filter the spam or phishing emails with different kinds of
techniques. These spam mails detection starts based on some characteristics of structures
verification. Every mail satisfies Meta data structure and some kinds constraints then to allow
for place the mail in inbox. This kind of procedure is called as tailored procedure. Now Inbox
maintains only trustworthy mails of content. These present filtering and detection techniques
are performing well under detection of targeted malicious mails detection. Next another step is
present for detection of persistent and recipient oriented attacks. Repeated intrusion attack
attempts are comes under persistent attacks. Identifies the list of bad senders and display the
recipient oriented emails.
Keywords:
Targeted malicious email, spam, phishing attacks, meta data structure, recipient and
persistent threats.
Existing System:
Previously attackers are entering in network environment. Email attackers are creates
the problems in network transmission. Some kinds of attacks are detects with the help of
firewall and antivirus techniques. Detection of attacks possible using alert systems and learning
systems. These kinds of systems are not working properly. It cannot possible for detect all kinds
of attacks.
Disadvantages:
1. Sensitive information loss problems are generated here.
2. Some kinds of emails are not detected here.
3. More amount of energy levels utilization under repeated attacks detection.
Proposed System:
Using new detection and filtering techniques starts the detection of phishing and spam
emails.

Every

mail

verifies

with

probability

distribution

characteristics.

Once

all

the

characteristics are satisfied in Meta data structure then to allow in inbox. In inbox all the mails
are placed here only trust worthy mails of content.

Meta data structure follows some data

mining techniques. In total number of mails after performing the preprocessing operation then
to apply here classification techniques. Classification gives the results like recipient and
persistent mails.

Advantages:
1. It can display bad list attackers information.
2. It is reduced the energy levels and cost.
Architecture:

Software Requirements Specifications:


Software Requirements:
Language

Frontend

Backend

IDE

Operating System

java (jdk1.6.0)
JSP, Servlets
oracle10g
my eclipse 8.0
windows XP

Hardware requirements:
Processor

Pentium IV

Hard Disk

80GB

RAM

2GB

Das könnte Ihnen auch gefallen