Improvement of Legitimate Mail Server Detection Method using Sender Authentication

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 09 Issue: 06 | June 2022

p-ISSN: 2395-0072

www.irjet.net

Improvement of Legitimate Mail Server Detection Method using Sender Authentication Asst. Prof. Kavya R1, Pooja P2, Jayant PB3, Jayanth kowshik4, Sushmitha MH5 1Assistant

Professor, Dept. of CSE, Vidya Vikas Institute of Engineering and Technology, Mysore, Karnataka, India. Dept. of CSE, Vidya Vikas Institute of Engineering and Technology, Mysore, Karnataka, India. ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract - The anti-spam measures include ways to detect 2,3,4,5 Student,

unsolicited email from email content and ways to use sender information. If it cannot be determined from the sender's IP address of the sender information and the sender's domain name whether the email should be received, it is possible to reduce the processing of spam filter by email content which has a heavy load of processing to determine. This study uses sender authentication technology to identify the sender of the forwarded email. We think the sender of this forwarded email is the official email sender to receive, and we suggest using them as a checklist. In this paper, we propose a way to further improve the approach we have proposed and reduce the misinterpretation of the approval list. We have verified that this new method works using login details for emails that are not actually accepted.

Key Words: Unsolicited emails, legitimated email,

Fig1: Architecture of the System.

Authentication technology, Ip address, AntiSpam.

2. LITERATURE SURVEY

1. INTRODUCTION Spam issues are not only annoying but also cause various security issues. For example, email is used as a way to pass on false information for the purposes of money exploitation, such as phishing and business email interception (BEC). Additionally, email is misused as a means of sending malware for information theft and creating externally controllable PCs called bots. To protect email users from spam, it is effective to apply spam filters on the receiving end. Various methods have been developed for the technology used in spam filters and have been effective to some extent. On the other hand, spammers are also trying to avoid being detected by these spam filters, and misperception of spam filters has become an inevitable problem. The problem of false positives identifying legitimate emails as spam is a major concern, especially for business email users.

• Legitimate mail server detection The problem of phishing email, also known as spam, including targeted phishing or spam-derived malware, has necessitated the need for reliable intelligent anti-spam email filters. This survey report describes a focused literature search on Artificial Intelligence (AI) and Machine Learning (ML) methods for intelligent spam email detection, which we believe can help develop appropriate countermeasures. • IP address and protocol In this article, we propose a method of collecting legitimate email servers as a method of building sender reputation. Legitimate e-mail servers collect the forwarded e-mail using their senders. This method is an improvement over the previously proposed method [7] in order to reduce false positives. We verified using the spam filter's evaluation result to evaluate whether the legitimate email server collected was correct.

3. REQUIREMENT ANALYSIS To achieve the aim of this system, the system requirements need to be determined. In this part the detail of the requirements will be determined in the following steps:

© 2022, IRJET

|

Impact Factor value: 7.529

|

ISO 9001:2008 Certified Journal

|

Page 3130


Turn static files into dynamic content formats.

Create a flipbook