A Sophisticated Approach to Detect Email Frauds
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016

A Sophisticated Approach to Detect Email Frauds

Sruthi Sree J S, Maniveena C

Electronic mail is a probably the most convenient way of transferring messages electronically from one person to another to any part of the world. Important features of e-mail such as its speed, reliability, efficient storage options and a huge number of added facilities make it highly popular among people from all sectors of business and society. Large amount of private and sensitive information is exchange using emails. But being popular has negative aspects too. Securing email has forever been an important issue. It can be used for both legitimate and illegitimate activities. Email frauds can be used for purposes such as spreading viruses, launch phishing attacks taking sensitive business data and other industrial espionage activities. Emails can be sent to a person from different address and it is not validated at any stage without being noticed by the receiver. Here presenting a new sophisticated approach to detect email frauds. This is the efficient method for providing integrity to emails.

Keywords: Phishing, Botnet, Features, Data Mining, Naive Bayes

Edition: Volume 5 Issue 5, May 2016

Pages: 415 - 419

Share this Article

How to Cite this Article?

Sruthi Sree J S, Maniveena C, "A Sophisticated Approach to Detect Email Frauds", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163311, Volume 5 Issue 5, May 2016, 415 - 419

97 PDF Views | 78 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Phishing'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 659 - 661

A Review of Anti Phishing Framework based on Visual Cryptography

D. N. Rewadkar, Asmita D. Abhyankar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna, Shaik Nyamathulla

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1488 - 1491

A Survey on: Email Security for Targeted Malicious Attacks

Jagdish R. Yadav, Dr. A. K. Srivastava

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2336 - 2339

Online Payment System using BPCS Steganography and Visual Cryptography

S. R. Khonde, Dheeraj Agarwal, Shrinivas Deshmukh

Share this Article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 310 - 313

Secure Server Verification by using Encryption Algorithm and Visual Cryptography

Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan

Share this Article

Similar Articles with Keyword 'Botnet'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1167 - 1172

Protection against Multi-Id Generation Autobots/Botnets Using Using Colored Visually Encoded OTPs Generated by the Random Function in the Spherical Space

Taranpreet Kaur, Harmandeep Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1368 - 1371

Spam and Zombie Detection System with Machine Learned Spot Algorithm

Manishankar.S, Sobin E. S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 572 - 575

Prevention of Mobile Botnet in VPN

Sukhwinder Singh, Navdeep Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1445 - 1447

A Survey on BotShark - Detection and Prevention of Peer-to-Peer Botnets by Tracking Conversation using CART

Pooja M. Pondkule, B. Padmavathi

Share this Article

Similar Articles with Keyword 'Features'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ear's Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the User's Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Similar Articles with Keyword 'Data Mining'

Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018

Pages: 1409 - 1411

Student's Performance Prediction Using FP-Tree Data Mining Techniques

Eliakim Ombati Akama

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2041 - 2047

Adaptive Analysis of Knowledge Engineering and Pattern Recognition on Medical Data

Jani Basha, Dasari. Rajesh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2214 - 2216

Privacy-Preserving Mining of Association Rules in Cloud

Vishal Ravindra Redekar, Dr. K.N.Honwadkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1127 - 1129

Trust Checking in Social Networks Using Data Mining

Archa.S

Share this Article

Similar Articles with Keyword 'Naive Bayes'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 408 - 410

Movie Recommendation System using Naive Bayes Algorithm with Collaborative Filtering

Anchal Dubey, Raju Ranjan

Share this Article

Case Studies, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1987 - 1990

Improving Auto Bug Triage by Effective Data Reduction

Roshna V. Sangle, Rajendra D. Gawali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1318 - 1323

Towards Keyword Based Recommendation System

Vinaya B. Savadekar, Pramod B. Gosavi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1624 - 1626

Smart Predictor: A Road Incident Prediction System using Hybrid Data Mining Approach on Traffic Data

Omkar Haldankar, P. S. Desai

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1514 - 1516

A Survey on Properties of Adaptive Boosting with Different Classifiers

Sumayya P, Shahad P

Share this Article
Top