International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
The Detection of Suspicious Email Based on Decision Tree Samruddhi Rane 1, Gargi Moholkar 2, Kajal Yerunkar 3, Prof. Nilima Nikam 4 B.E. Students, Department of Computer Engineering, Yadavrao Tasgaonkar Institute Of Engineering And Technology, Bhivpuri Road, Karjat, 4 Professor, Department of Computer Engineering, Yadavrao Tasgaonkar Institute Of Engineering And Technology, Bhivpuri Road, Karjat, Mumbai University, Maharashtra,India
1,2,3
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - There are many places where we have local area
networks and many people using them as per their own needs. In such conditions, we have to closely monitor the computers. Many a times, there comes a situation when we need to lock the resources such as drives, folders or files on these computers to restrict the users of making use of them. Sometimes we need to stop the users from using the internet or from changing the setting or accessing the registry editor so as to secure the systems from any crash due to misuse of it. These are the common task that we do in our day to day life but for this we don’t have utility software. The aim of this project is to suspect the E-mails which consist of offensive, anti-social elements and block them which help in identifying the suspicious user. In this project, suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX, are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent this mail. This is very useful in real-time scenario in which you can resume the Criminal activities. Key Words: secure the systems, suspect the E-mails, block, suspicious users, Criminal activities
1. INTRODUCTION The idea behind selecting in-house project is to develop software which gives wider scope to express our knowledge. Email has been an efficient and popular ,work done by various researches suggests that deceptive writing is characterized by reduced frequency of first person pronouns and exclusive words and elevated frequency of negative emotion words and action verbs. In many security informatics applications it is frequency of first-person pronouns and exclusive important to detect deceptive communication in email. We apply this model of deception to the set of Email .The rules generated are used to test the email as deceptive or not. In particular we are interested in detecting emails about criminal activities. After classification we must be able to differentiate the emails giving information about past criminal activities (Informative email) and those acting as alerts (warnings) for the future criminal activities. This differentiation is done using the features considering the tense used in the emails. Experimental results show that Š 2017, IRJET
|
Impact Factor value: 5.181
|
simple associative classifier provides promising detection rates. Our purpose is to develop software that can be used: 1. To find a system that identifies deception in Email through communication. 2. Classified deceptive Email. 3. After classification of deceptive Email, we must classify them into informative Emails and alert Emails. Concern about National security has increased since the terrorist attack on September 2001.The CIA, FBI and other federal agencies are actively collecting domestic and foreign intelligence to prevent future attacks. These efforts have in turn motivated us to collect data's and undertake this paper work as a challenge. Data mining is a powerful tool that enables criminal investigators who may lack extensive training as data analyst to explore large databases quickly and efficiently. Computers can process thousands of instructions in seconds, saving precious time. In addition, installing and running software often costs less than hiring and training personality. To our knowledge, the first attempt to apply Association rule mining to task of suspicious Email Detection (Emails about criminal activities). The reason they have eluded conclusion extracting the informative emails using the tense (Past tense) of the verbs used in the emails. Apart from the informative emails, other emails are considered as the alerting emails for the future occurrences of hazardous activities. Objective is to protect the security and morale of nation which is being broken down due to the constant attack and threat on the people of our nation. This project helps us to detect the emails sent by the people on internet which can harm out integrity. By the use of this technique, the emails can be found out in a manner which can inform us about past activities as well as alert us about the future activities. Hence it can be used in cyber investigation for the security from suspicious emails.
1.1 Existing System Aniruddha Kshirsagar and Hanmant N. Renushe proposed that various data mining techniques can be used to overcome the critical issue of identity fraud. They proposed
ISO 9001:2008 Certified Journal
|
Page 2474