You are on page 1of 7

SYNOPSIS

“Detecting Targeted Malicious


Email”

Aim & Objective:

This project related to mass generated emails. Some numbers of email


systems are not register in server. These un-authentication email systems are
forward the unnecessary mails of content and store into inbox. These emails are
dangerous. These types of emails we are call as a spam or phishing emails.
Previous detection techniques are not performing for detection of targeted
malicious mails. Here filter the spam or phishing emails with different kinds of
techniques. These spam mails detection starts based on some characteristics of
structures verification. Every mail satisfies Meta data structure and some kind’s
constraints then to allow for place the mail in inbox. This kind of procedure is
called as tailored procedure. Now Inbox maintains only trustworthy mails of
content. These present filtering and detection techniques are performing well
under detection of targeted malicious mails detection. Next another step is
present for detection of persistent and recipient oriented attacks. Repeated
intrusion attack attempts are comes under persistent attacks. Identifies the list
of bad senders and display the recipient oriented emails .

Keywords:

Targeted malicious email, spam, phishing attacks, meta data structure,


recipient and persistent threats.
Existing & Proposed System:

Existing System:

Previously attackers are entering in network environment. Email attackers


are creates the problems in network transmission. Some kinds of attacks are
detects with the help of firewall and antivirus techniques. Detection of attacks
possible using alert systems and learning systems. These kinds of systems are
not working properly. It cannot possible for detect all kinds of attacks.

Disadvantages:

1. Sensitive information loss problems are generated here.


2. Some kinds of emails are not detected here.
3. More amount of energy levels utilization under repeated attacks detection.

Proposed System:

Using new detection and filtering techniques starts the detection of


phishing and spam emails. Every mail verifies with probability distribution
characteristics. Once all the characteristics are satisfied in Meta data structure
then to allow in inbox. In inbox all the mails are placed here only trust worthy
mails of content. Meta data structure follows some data mining techniques. In
total number of mails after performing the preprocessing operation then to
apply here classification techniques. Classification gives the results like recipient
and persistent mails.

Advantages:
1. It can display bad list attacker’s information.
2. It is reduced the energy levels and cost.

Project Implementation & Design:

Modules Description:

1. Targeted malicious attacks structure


2. Dataset construction
3. Targeted Malicious email, Non targeted malicious email
4. Persistent, Recipient oriented attacks detection

1. Targeted Malicious attacks Structure:

Targeting the persistent threats, introduces Meta data environment. It


Meta data structure environment contains some fields of contents related
recipients. Those fields are email address, subject lines, attach files etc. using
the fields perform the verification operation here. Using these conditions control
all different locations internet wide attacks here.

2. Dataset Construction:

Dataset contains all related features of different attacks. Using dataset


only starts the training process here. After completion of training process then
perform the detect of attacks. Those attacks related emails classify here. That
classification of related emails comes under targeted malicious mails, non
targeted malicious mail, persistent and recipient oriented mails.

3. Targeted malicious email, non Targeted Malicious email:

Dataset contains communication related emails in between of customer to


company. In total number of dataset emails comes under anti spam those mails
are comes non targeted emails. Spam mail are comes under targeted malicious
mails.

4. Persistent, Recipient oriented emails:

Repeated intrusion attempts are identifies as persistent emails. Sender sends


the content repeated to particular recipient, those recipient mails are contains
high reputation values. Those reputation related mails are comes under
Recipient oriented mails here.

Architecture:

Software Requirements Specifications:

Software Requirements:

Language : java (jdk1.6.0)


Frontend : JSP, Servlets
Backend : oracle10g
IDE : my eclipse 8.0
Operating System : windows XP

Hardware requirements:
Processor : Pentium IV
Hard Disk : 80GB
RAM : 2GB

You might also like