SlideShare ist ein Scribd-Unternehmen logo
1 von 40
SUMMETR INTERNSHIP
                     ON
          HARMFUL MAIL SCANNING




                             By
               N.KIRAN KUMAR(10100350)
                             CSE



SUSPICIOUS EMAIL DETECTION   1
CONTENTS
1:COMPANY         PROFILE
2:INTRODUCTION
2.1:SCOPE
2.2:PURPOSE OF PROJECT
2.3:OVERVIEW
2.4:ARCHITECTURE
3:LITERATURE STUDY
3.1:JAVA
3.2:SERVLET
3.3:JSP
3.4:JDBC
3.5:ORACLE
3.6:NORMALIZATION
3.7:HTML
3.8:JAVA SCRIPT
4:SYSTEM ANALYSIS
4.1:EXISTING SYSTEM & DISADVANTAGE
4.2:PROPOSED SYSTEM & ADVANTAGES

SUSPICIOUS EMAIL DETECTION     2
5:SYSTEM DIAGRAM
5.1:UML DIAGRAMS
5.2:DATA FLOW DIAGRAMS
5.3:CLASS DIAGRAMS
5.4:SEQUENCE DIAGRAMS
6:SYSTEM TESTING
6.1:UNIT TESTING
6.2:INTEGRATION TESTING
6.3:SYSTEM TESTING
6.4:ACCEPTANCE TESTING
6.5:VALIDATION
7:SCREENS
8:CONCLUSION
9:FUTURE ENHANEMENTS
10:BIBILOGRAPY




SUSPICIOUS EMAIL DETECTION   3
COMPANY PROFILE
     We are Oracle specialists, providing
     Oracle Applications services for over a decade. Our
     Oracle Center of Excellence at Dubai and Hyderabad
     provides highly effective solutions to help our clients
     optimize their investments in Oracle products. With a
     large pool of certified Oracle experts, we provide end-
     to-end Oracle E-Business Suite solutions including
     implementations, upgrades, and application
     management services such as hosting, remote DBA,
     help desk, archive and purge services, and a broad
     range of other technical services.


SUSPICIOUS EMAIL DETECTION    4
Our long-term product engineering development
     relationship with Oracle Middle East and off late with
     Oracle India and recognition as Global Certified
     Partner differentiates us from other services
     providers, giving us thorough knowledge of the
     product suite complementing our deep domain
     experience to satisfy our customers diverse needs
     from implementation and upgrades to solution
     design, product customization and application
     integration all the way to guaranteed, cost effective
     application management and support.


            Marvel's mission is to ensure our clients'
     success with Oracle E-Business Suite by doing it the
     right way, every time. We use the proven Marvel
     MIM® a modified version of Oracle's AIM project
     methodology to help our clients successfully deploy
     Oracle technology worldwide, providing an
     integrated suite of professional services, integration
     software, training and managed services, from the
     strategy and design phases through implementation


SUSPICIOUS EMAIL DETECTION    5
and ongoing support.




     Our Applications consulting services:
     • Implementation Strategy and Planning
     • Upgrade Strategy and Planning
     • Build Versus Buy Decisions
     • License and Support Migration
     • Technology and Platform Migration
     • Server & Storage Consolidation
     • Architecture Strategy and Planning
     • Total Cost of Ownership (TCO) Reduction
     • Disaster Recovery Planning
     • E-Business Strategy
     • Merger & Acquisition IT Strategy and Planning.




SUSPICIOUS EMAIL DETECTION   6
The key Project Management Services we deliver are:
     • Project Chartering & Scoping
     • Resource Management
     • Financial Budget Management
     • Communication Management
     • Project Planning
     • Training Planning
     • Risk Management
     • Quality Management
     • Project Execution




SUSPICIOUS EMAIL DETECTION   7
INTRODUCTION


SCOPE
      In this project, suspicious users are identified by
determining the keywords used by him/her. The
keywords such as bomb, RDX, are found in the mails
which are sent by the user. All these blocked mails are
checked by the administrator and identify the users who
sent such mails. This is very useful in real-time
scenario in which you can resume the anti-social
activities.
     PURPOSE OF THE PROJECT

SUSPICIOUS EMAIL DETECTION   8
The purpose of the project is to suspect the E-mails
which consist of offensive, anti-social elements and
block them which help in identifying the suspicious
user.
     OVERVIEW OF PROJECT
     1)Login Module
     2)Registration Module

     3)Administration Module

     4)Encryption Module

     5)User Module

     6)Mailing Module

     Login Module

     This module is used by administrator and users
(who are authenticated) to login into the Colors mail.
The login details of the specified person will be entered
and hence can enter into the Colors mail.


SUSPICIOUS EMAIL DETECTION   9
Registration Module

     This module is used by the unauthenticated users
who are unregistered. The users must register
themselves such that they can login into the Colors
mail.

     Administration Module

                 This module is used by the administrator
to perform the functions like managing the keywords,
entering new keywords and to check out the block list
of the discarded mails.

     Encryption Module

     This module is used by the administrator to
perform the functions like encryption of the `words.
The encrypted words are sent to the database and hence
managed by the administrator.

     User Module

SUSPICIOUS EMAIL DETECTION   10
This module is used by the users to do
operations like composing mail, checking out the mails
in inbox and finally sending the mails to the
authenticated users by attaching a message.

     Mailing Module

               This module is used by the users perform
mailing system. The mailing system consists of
composing the mails, sending the mails and checking
out the mails in inbox.This module allows employees to
register and manage patient details. When a request is
made,     an   employee      immediately   dispatches   an
ambulance with available doctor and other attendants.
Employee keeps track of patient status and in case of
emergency consults a hospital for admitting the patient.

                        LITERATURE SURVEY

        ABOUT JAVA


SUSPICIOUS EMAIL DETECTION    11
Initially the language was called as “oak” but it was
renamed as “java” in 1995.The primary motivation of
this language was the need for a platform-independent
(i.e. architecture neutral) language that could be used to
create software to be embedded in various consumer
electronic devices.

       • Java is a programmer’s language
       • Java is cohesive and consistent
       • Except for those constraint imposed by the
          Internet     environment.   Java    gives   the
          programmer, full control
     Finally Java is to Internet Programming where c
was to System Programming.

     Initially the language was called as “oak” but it was
renamed as “java” in 1995.The primary motivation of
this language was the need for a platform-independent
(i.e. architecture neutral) language that could be used to



SUSPICIOUS EMAIL DETECTION   12
create software to be embedded in various consumer
electronic devices.

       • Java is a programmer’s language
       • Java is cohesive and consistent
       • Except for those constraint imposed by the
          Internet     environment.   Java   gives   the
          programmer, full control
     Finally Java is to Internet Programming where c
was to System Programming.

APPLICATIONS AND APPLETS
          An application is a program that runs on our
Computer under the operating system of that computer.
It is more or less like one creating using C or C++
.Java’s ability to create Applets makes it important. An
Applet I san application, designed to be transmitted
over the Internet and executed by a Java-compatible
web browser. An applet I actually a tiny Java program,
dynamically downloaded across the network, just like

SUSPICIOUS EMAIL DETECTION   13
an image. But the difference is, it is an intelligent
program, not just a media file. It can be react to the user
input and dynamically change.

JAVA ARCHITECTURE                       Java    architecture
provides     a    portable,   robust,    high   performing
environment for development. Java provides portability
by compiling the byte codes for the Java Virtual
Machine, which is then interpreted on each platform by
the run-time environment. Java is a dynamic system,
able to load code when needed from a machine in the
same room or across the planet.

COMPLILATION OF CODE




SUSPICIOUS EMAIL DETECTION    14
When you compile the code, the Java compiler
    creates machine code (called byte code) for a
    hypothetical machine called Java Virtual Machine
    (JVM). The JVM is supposed t executed the byte
    code. The JVM is created for the overcoming the
    issue of probability. The code is written and
    compiled for one machine and interpreted on all
    machines .This machine is called Java Virtual
    Machine.
COMPILING AND INTERPRETING JAVA
SOURCE CODE

                                                      Java
                        Pc             Java Byte   interpreter
                      compiler           code
                                                       Java
                      Macintosh
                                                   interpreterm
                      compiler
                                       Platform      acintosh
      Source                           independ
       code                               ent
                     SPARC                             Java
                     Compiler                       interprete
                                                     r(SPARC)




SUSPICIOUS EMAIL DETECTION        15
)))




     During run-time the Java interpreter tricks the
byte code file into thinking that it is running on a Java
Virtual Machine. In reality this could be an Intel
Pentium windows 95 or sun SPARCstation running
Solaris or Apple Macintosh running system and all
could receive code from any computer through
internet and run the Applets.

     SERVLET
  INTRODUCTION
     A Servlet is a generic server extension. a Java class
that can be loaded           Dynamically to expand the
functionality of a server. Servlets are commonly used
with web servers.Where they can take the place CGI
scripts.
              A servlet is similar to proprietary server
extension, except that it runs inside a Java Virtual
Machine (JVM) on the server, so it is safe and portable


SUSPICIOUS EMAIL DETECTION    16
Servlets operate solely within the domain of the server.
          Unlike CGI and Fast CGI, which use multiple
processes to handle separate program or separate
requests, separate threads within web server process
handle all servlets. This means that servlets are all
efficient and scalable. Servlets are portable; both across
operating systems and also across web servers. Java
Servlets offer the best possible platform for web
application development.
        Servlets are used as replacement for CGI scripts
on a web server,they can extend any sort of server such
as a mail server that allows servlets extend its
functionality perhaps by performing a virus scan on all
attached documents or handling mail filtering tasks.
          For example an HTTP servlet can be used to
generate dynamic HTML content when you use servlets
to do dynamic content you get the following
advantages:
     • They’re faster and cleaner then CGI scripts

SUSPICIOUS EMAIL DETECTION   17
• They use a standard API( the servlet API)
      •   They provide all the advantages of Java (run on a
          variety      of servers without needing    to be
          rewritten.
ADVANTAGES OF THE SERVLET API
  • One of the great advantages of the servlet API is
      protocol independent. It assumes nothing about:
  • The protocol being used to transmit on the net
  • How it is loaded
  • The server environment it will be running in
  •   These quantities are important, because it allows
      the Servlet API to be embedded in many different
      kinds of servers. There are other advantages to the
      servlet. API as well These include:
  • It’s extensible-you can inherit all your functionality
      from the base classes made available to you
  • It’s simple small, and easy to use.

      FEATURES OF SERVLETS

SUSPICIOUS EMAIL DETECTION      18
• Servlets are persistent.Servlet are loaded only by
     the web server and can maintain services between
     requests.
  • Servlets are fast. Since servlets only need to be
     lloaded once, they offer much better performance
     over their CGI counterparts.
  • Servlets are platform independent.
  • Servlets are extensible Java is a robust, object-
     oriented programming language, which easily can
     be extended to suit your needs.
  • Servlets are secure
  • Servlets are used with a variety of client.

LOADING SERVLETS
     Servlets can be loaded from their places. From a
directory     that   is      on    the   CLASSPATH.   The
CLASSPATH of the JavaWebServer includes service
root/classes/, which is where the system classes reside
Remote servlets can be loaded by


SUSPICIOUS EMAIL DETECTION        19
• Configuring the admin Tool to setup automatic
     loading of remote servlets.
  • Selectiong up server side include tags in .html files
  • Defining a filter chain Configuration

INVOKING SERVLETS
A Client can Invoke Servlets in the Following Ways:
  • The client can ask for a document that is served by
     the servlet.
  • The client(browser) can invoke the servlet directly
     using a URL, once it has been mapped using the
     SERVLET ALIASES Section of the admin GUI
  • The servlet can be invoked through server side
     include tags.
  • The servlet can be invoked by placing it in the
     servlets/directory
  • The servlet can be invoked by using it in a filter
     chain
JSP

SUSPICIOUS EMAIL DETECTION   20
The first JavaServer Pages specification was
released in 1999. Originally JSP was modeled after
other server-side template technologies to provide a
simple method of embedding dynamic code with static
markup. When a request is made for the content of a
JSP, a container interprets the JSP, executes any
embedded code, and sends the results in a response. At
the time this type of functionality was nothing terribly
new, but it was and still is a helpful enhancement to
Servlets.
JSP LIFE CYCLE
          Much like Servlets, understanding JSP requires
understanding the simple life cycle that JSP follows.
JSP follows a three-phase life cycle: initialization,
service, and destruction, as shown in Figure 3-1. This
life cycle should seem familiar and is identical to the
one described for Servlets.
       While a JSP does follow the Servlet life cycle, the
methods       have      different   names.   Initialization

SUSPICIOUS EMAIL DETECTION     21
corresponds to the jspInit() method, service corresponds
to   the     _jspService()   method,   and   destruction
corresponds to the jspDestroy() method. The three
phases are all used the same as a Servlet and allow a
JSP to load resources, provide service to multiple client
requests, and destroy loaded resources when the JSP is
taken out of service.




JDBC
WHAT IS JDBC?
     Any relational database. One can write a single
program using the JDBC API, and the JDBC is a Java
Api for executing SQL, Statements(As a point of


SUSPICIOUS EMAIL DETECTION   22
interest JDBC is trademarked name and is not an
acronym; nevertheless, Jdbc is often thought of as
standing for Java Database Connectivity. It consists of a
set of classes and interfaces written in the Java
Programming language. JDBC provides a standard API
for tool/database developers and makes it possible to
write database applications using a pure Java API
WHAT DOES JDBC DO?
      • Establish a connection with a database
  • Send SQL statements
  • Process the results
  • JDBC Driver Types
  • The JDBC drivers that we are aware of this time fit
      into one of four categories
  • JDBC-ODBC Bridge plus ODBC driver
  • Native-API party-java driver
  • JDBC-Net pure java driver

  •   Native-protocol pure Java driver

SUSPICIOUS EMAIL DETECTION   23
HTML
     Hypertext      Markup     Language    (HTML),    the
languages of the worldwideweb (WWW), allows users
to produces web pages that included text, graphics and
pointer to other web pages (Hyperlinks).
HTML is not a programming language but it is an
application of ISO Standard 8879, SGML (Standard
Generalized Markup Language), but Specialized to
hypertext and adapted to the Web. The idea behind
hypertext one point to another point. We can navigate
through the information based on out interest and
preference. A markup language is simply a series of
items enclosed within the elements should be displayed.
ADVANTAGES


  • A HTML document is small and hence easy to send
     over the net.It is small because it does not include
     formatted information.


SUSPICIOUS EMAIL DETECTION    24
• HTML is platform independent
  •   HTML tags are not case-sensitive.
JAVA SCRIPT
         The Java Script Language JavaScript is a
         compact, object-based scripting language for
         developing          client    and   server   internet
         applications. Netscape Navigator 2.0 interprets
         JavaScript statements embedded directly in an
         HTML page. and Livewire enables you to
         create server-based applications similar to
         common gateway interface (CGI) programs.
In a client application for Navigator, JavaScript
statements embedded in an HTML Page can recognize
and respond to user events such as mouse clicks form
Input, and page navigation.

                 SYSTEM ANALYSIS
EXISTING SYSTEM & DISADVANTAGES


SUSPICIOUS EMAIL DETECTION        25
In the existing system, the mails are sent to the
authenticated users who are intended to be received.
Some defects in existing system are:
  • Suspicious mails cannot be detected.
  • Offensive users cannot be identified.

PROPOSED                     SYSTEM          &         ITS
ADVANTAGES
      In the proposed system the suspicious users are
detected and the offensive mails are blocked
Features of proposed system:
  • This helps in finding out anti social elements.
  • This provides the security to system which adapts
     it.
  • This also helps the intelligence bureau, crime
     branch etc.,
  • Insurance premium calculations, for quarterly, half
     yearly and annually is completely automated gives
     us a reliable environment.
SUSPICIOUS EMAIL DETECTION     26
• The system provides claim reporting and status
     enquiry.
UML DIAGRAMS

UNIFIED MODELING LANGUAGE
     The Unified Modeling Language allows the
software engineer to express an analysis model using
the modeling notation that is governed by a set of
syntactic semantic and pragmatic rules.A UML system
is represented using five different views that describe
the system from distinctly different perspective. Each
view is defined by a set of diagram, which is as follows.
     USER MODEL VIEW
     •    This view represents the system from the users
     perspective.
     •    The analysis representation describes a usage
          scenario from the end-users perspective.
STRUCTURAL MODEL VIEW

SUSPICIOUS EMAIL DETECTION   27
•    In this model the data and functionality are
          arrived from inside the system.
     •    This model view models the static structures.

ENVIRONMENTAL MODEL VIEW

           In this the structural and behavioral
aspects of the environment in which the
system is to be implemented are represented.
                  UML is specifically constructed
through two different domains they are:
  • UML Analysis modeling, this focuses on
     the user model and structural model views
     of the system.
DATA FLOW DIAGRAMS

ADMIN




SUSPICIOUS EMAIL DETECTION   28
USER




CLASS DIAGRAMS

 ADMIN
                               Keywords
                             Manage Keywords

                             Add Keywords()
                             Display Keywords()


        Admin
   Keywords
   Alert Mails
   Informative
                                 Block List
   Enter keywords()            Alert Mails
   check mails()               Informative Mails

                               check mails()




SUSPICIOUS EMAIL DETECTION                29
Compose Mails
                                                                 composing the mail

                                                                 send the mail()



                                                                         Sent Mails
    User
                                                                     Sent items
   Mails
                                                                     check the sent items()
   Compose()
   send()

                                                                         Inbox
                                                                 Received mails

                                                                 check the received mails()




 SEQUENCE DIAGRAM

  ADMIN
     Admin                                Keywords             Alert List                     Informative


                  Manage Keywords




                            Check Alert Mails




                                          Check Informative Mails




 USER
     User                        Compose Mails               Inbox                    Sent Items


           Compose the mails to be sent


                           Check the mails




                                      Check the sent mails




SUSPICIOUS EMAIL DETECTION                                                             30
SYSTEM TESTING
           Testing is a process, which reveals errors in the
program. It is the major quality        measure employed
during     software     development.    During     software
development.       During          testing, the program is
executed with a set of test cases and the output of the
program for the test cases is evaluated to determine if
the program is performing as it is expected to perform.
 TESTING IN STRATEGIES
           In order to make sure that the system does not
have errors, the different levels of testing strategies that
are applied at differing phases of software development
are:
 UNIT TESTING
       Unit Testing is done on individual modules as they
are completed and become executable. It is confined
only to the designer's requirements. Each module can be
tested using the following two Strategies:

SUSPICIOUS EMAIL DETECTION    31
INTEGRATING TESTING
          Integration testing ensures that software and
subsystems work together a whole. It tests the interface
of all the     modules to make sure that the modules
behave properly when integrated together.
 SYSTEM TESTING
         Involves in-house testing of the entire system
before delivery to the user. It's aim is to satisfy the user
the system meets all requirements of the client's
specifications.
 TEST APPROACH
     Testing can be done in two ways:
  • Bottom up approach
  • Top down approach

BOTTOM UP APPROACH
     Testing can be performed starting from smallest
and lowest level modules and proceeding one at a time.
For each module in bottom up testing a short program

SUSPICIOUS EMAIL DETECTION   32
executes the module and provides the needed data so
that the module is asked to perform the way it will
when embedded with in the larger system. When
bottom level modules are tested attention turns to those
on the next level that use the lower level ones they are
tested individually and then linked with the previously
examined lower level modules.
TOP DOWN APPROACH
     This type of testing starts from upper level
modules. Since the detailed activities usually performed
in the lower level routines are not provided stubs are
written. A stub is a module shell called by upper level
module and that when reached properly will return a
message to the calling module indicating that proper
interaction occurred. No attempt is made to verify the
correctness of the lower level module.
VALIDATION
     The system has been tested and implemented
successfully and thus ensured that all the requirements

SUSPICIOUS EMAIL DETECTION   33
as listed in the software requirements specification are
completely fulfilled.        In case of erroneous input
corresponding error messages are displayed
DISCUSSION OF SCREENS
HOME PAGE




ADMIN’S LOGIN PAGE




ADMIN’S LOGIN PAGE




SUSPICIOUS EMAIL DETECTION    34
ADDING A KEYWORD




DISPLAYING THE KEYWORD




USER’S REGISTRATION




SUSPICIOUS EMAIL DETECTION   35
USER’S LOGIN




USER’S LOGIN PAGE




 ALERT LIST OF BLOCKED MAILS IN
ADMIN PAGE


SUSPICIOUS EMAIL DETECTION   36
Fig 7.4.9
                         Here are the mails which had
been got blocked in admin’s page due to hazardous
information in the mail
          CONCLUSION AND FUTURE
                  ENHANCEMENTS
CONCLUSION
     Email     has    been   an     efficient    and   popular
communication mechanism as the number of Internet
user's    increase.    In    many     security     informatics
applications it is important to detect deceptive
communication in email. In this application the mails
are classified as suspicious or normal using the key

SUSPICIOUS EMAIL DETECTION    37
words and encrypted keywords. The mails containing
these keywords and encrypted keywords are classified
as suspicious mails and they can be blocked and
verified by the administrator. The proposed work will
be helpful for identifying the suspicious email and also
assist the investigators to get the information in time to
take effective actions to reduce the criminal activities.
FUTURE ENHANCEMENTS
        Even though the project fulfills the requirements
of the present application there is always scope for
further work. According to the emerging changes and
new versions, further work can be done to improve the
application Since project is designed in a flexible
software.
            This application which is a web based is of
standalone application. This can be implemented on
internet by buying the network space and by creating a
website.


SUSPICIOUS EMAIL DETECTION   38
The present application when implemented on
internet requires a large database as the backend; this
can be done by using the MySql database as the
backend.




BIBILOGRAPHY
  •   http://www.marvel.ae/html/Marvel
      %20Company%20profile.pdf
  • Java
  • Html
  • Jsp
  • Java script
  • Jdbc
  • servlet
  • oracle

SUSPICIOUS EMAIL DETECTION   39
•   www.w3professors.com




SUSPICIOUS EMAIL DETECTION   40

Weitere ähnliche Inhalte

Was ist angesagt?

Report police - 6 month training project
Report police - 6 month training project Report police - 6 month training project
Report police - 6 month training project Janella
 
Blocking misbehaving users in anonymizing network-project ppt*
Blocking misbehaving users in anonymizing network-project ppt*Blocking misbehaving users in anonymizing network-project ppt*
Blocking misbehaving users in anonymizing network-project ppt*dinesh krishna
 
Nymble:Blocking misbehaving users in annoying networks(Link)
Nymble:Blocking misbehaving users in annoying networks(Link)Nymble:Blocking misbehaving users in annoying networks(Link)
Nymble:Blocking misbehaving users in annoying networks(Link)Mysa Vijay
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
 
Image Based Authentication System
Image Based Authentication SystemImage Based Authentication System
Image Based Authentication SystemPRINCE PRANAV
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
INTRANET MAILING SYSTEM BY SAIKIRAN PANJALA
INTRANET MAILING SYSTEM BY SAIKIRAN PANJALAINTRANET MAILING SYSTEM BY SAIKIRAN PANJALA
INTRANET MAILING SYSTEM BY SAIKIRAN PANJALASaikiran Panjala
 

Was ist angesagt? (9)

Report police - 6 month training project
Report police - 6 month training project Report police - 6 month training project
Report police - 6 month training project
 
Blocking misbehaving users in anonymizing network-project ppt*
Blocking misbehaving users in anonymizing network-project ppt*Blocking misbehaving users in anonymizing network-project ppt*
Blocking misbehaving users in anonymizing network-project ppt*
 
Nymble:Blocking misbehaving users in annoying networks(Link)
Nymble:Blocking misbehaving users in annoying networks(Link)Nymble:Blocking misbehaving users in annoying networks(Link)
Nymble:Blocking misbehaving users in annoying networks(Link)
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
Image Based Authentication System
Image Based Authentication SystemImage Based Authentication System
Image Based Authentication System
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Mrugnayana Savekar
Mrugnayana SavekarMrugnayana Savekar
Mrugnayana Savekar
 
Sql injection
Sql injectionSql injection
Sql injection
 
INTRANET MAILING SYSTEM BY SAIKIRAN PANJALA
INTRANET MAILING SYSTEM BY SAIKIRAN PANJALAINTRANET MAILING SYSTEM BY SAIKIRAN PANJALA
INTRANET MAILING SYSTEM BY SAIKIRAN PANJALA
 

Ähnlich wie Summerinternship

J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01Jay Palit
 
Java & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate FrameworkJava & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate FrameworkMohit Belwal
 
Core Java Slides
Core Java SlidesCore Java Slides
Core Java SlidesVinit Vyas
 
0f0cef_1dac552af56c4338ab0672859199e693.pdf
0f0cef_1dac552af56c4338ab0672859199e693.pdf0f0cef_1dac552af56c4338ab0672859199e693.pdf
0f0cef_1dac552af56c4338ab0672859199e693.pdfDeepakChaudhriAmbali
 
C,c++,java,php,.net training institute in delhi, best training institute for ...
C,c++,java,php,.net training institute in delhi, best training institute for ...C,c++,java,php,.net training institute in delhi, best training institute for ...
C,c++,java,php,.net training institute in delhi, best training institute for ...MCM COmpetitive Classes
 
Chapter 1 introduction to java technology
Chapter 1 introduction to java technologyChapter 1 introduction to java technology
Chapter 1 introduction to java technologysshhzap
 
198970820 p-oooooooooo
198970820 p-oooooooooo198970820 p-oooooooooo
198970820 p-oooooooooohomeworkping4
 
FRAUD DETECTION IN ONLINE AUCTIONING
FRAUD DETECTION IN ONLINE AUCTIONINGFRAUD DETECTION IN ONLINE AUCTIONING
FRAUD DETECTION IN ONLINE AUCTIONINGSatish Chandra
 
Java Introduction | PDF
Java Introduction |  PDFJava Introduction |  PDF
Java Introduction | PDFGeekster
 
Java Lecture 1
Java Lecture 1Java Lecture 1
Java Lecture 1Qualys
 

Ähnlich wie Summerinternship (20)

E farming
E farmingE farming
E farming
 
Core java slides
Core java slidesCore java slides
Core java slides
 
HR OPERATION MANAGER
HR OPERATION MANAGERHR OPERATION MANAGER
HR OPERATION MANAGER
 
Srgoc java
Srgoc javaSrgoc java
Srgoc java
 
Java presentation
Java presentationJava presentation
Java presentation
 
Java ms harsha
Java ms harshaJava ms harsha
Java ms harsha
 
J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01J2ee strutswithhibernate-140121221332-phpapp01
J2ee strutswithhibernate-140121221332-phpapp01
 
Java & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate FrameworkJava & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate Framework
 
Core Java Slides
Core Java SlidesCore Java Slides
Core Java Slides
 
report
reportreport
report
 
Java-Unit-I.ppt
Java-Unit-I.pptJava-Unit-I.ppt
Java-Unit-I.ppt
 
0f0cef_1dac552af56c4338ab0672859199e693.pdf
0f0cef_1dac552af56c4338ab0672859199e693.pdf0f0cef_1dac552af56c4338ab0672859199e693.pdf
0f0cef_1dac552af56c4338ab0672859199e693.pdf
 
C,c++,java,php,.net training institute in delhi, best training institute for ...
C,c++,java,php,.net training institute in delhi, best training institute for ...C,c++,java,php,.net training institute in delhi, best training institute for ...
C,c++,java,php,.net training institute in delhi, best training institute for ...
 
Chapter 1 introduction to java technology
Chapter 1 introduction to java technologyChapter 1 introduction to java technology
Chapter 1 introduction to java technology
 
198970820 p-oooooooooo
198970820 p-oooooooooo198970820 p-oooooooooo
198970820 p-oooooooooo
 
Remote Web Desk
Remote Web DeskRemote Web Desk
Remote Web Desk
 
Ob Essay
Ob EssayOb Essay
Ob Essay
 
FRAUD DETECTION IN ONLINE AUCTIONING
FRAUD DETECTION IN ONLINE AUCTIONINGFRAUD DETECTION IN ONLINE AUCTIONING
FRAUD DETECTION IN ONLINE AUCTIONING
 
Java Introduction | PDF
Java Introduction |  PDFJava Introduction |  PDF
Java Introduction | PDF
 
Java Lecture 1
Java Lecture 1Java Lecture 1
Java Lecture 1
 

Kürzlich hochgeladen

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Kürzlich hochgeladen (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Summerinternship

  • 1. SUMMETR INTERNSHIP ON HARMFUL MAIL SCANNING By N.KIRAN KUMAR(10100350) CSE SUSPICIOUS EMAIL DETECTION 1
  • 2. CONTENTS 1:COMPANY PROFILE 2:INTRODUCTION 2.1:SCOPE 2.2:PURPOSE OF PROJECT 2.3:OVERVIEW 2.4:ARCHITECTURE 3:LITERATURE STUDY 3.1:JAVA 3.2:SERVLET 3.3:JSP 3.4:JDBC 3.5:ORACLE 3.6:NORMALIZATION 3.7:HTML 3.8:JAVA SCRIPT 4:SYSTEM ANALYSIS 4.1:EXISTING SYSTEM & DISADVANTAGE 4.2:PROPOSED SYSTEM & ADVANTAGES SUSPICIOUS EMAIL DETECTION 2
  • 3. 5:SYSTEM DIAGRAM 5.1:UML DIAGRAMS 5.2:DATA FLOW DIAGRAMS 5.3:CLASS DIAGRAMS 5.4:SEQUENCE DIAGRAMS 6:SYSTEM TESTING 6.1:UNIT TESTING 6.2:INTEGRATION TESTING 6.3:SYSTEM TESTING 6.4:ACCEPTANCE TESTING 6.5:VALIDATION 7:SCREENS 8:CONCLUSION 9:FUTURE ENHANEMENTS 10:BIBILOGRAPY SUSPICIOUS EMAIL DETECTION 3
  • 4. COMPANY PROFILE We are Oracle specialists, providing Oracle Applications services for over a decade. Our Oracle Center of Excellence at Dubai and Hyderabad provides highly effective solutions to help our clients optimize their investments in Oracle products. With a large pool of certified Oracle experts, we provide end- to-end Oracle E-Business Suite solutions including implementations, upgrades, and application management services such as hosting, remote DBA, help desk, archive and purge services, and a broad range of other technical services. SUSPICIOUS EMAIL DETECTION 4
  • 5. Our long-term product engineering development relationship with Oracle Middle East and off late with Oracle India and recognition as Global Certified Partner differentiates us from other services providers, giving us thorough knowledge of the product suite complementing our deep domain experience to satisfy our customers diverse needs from implementation and upgrades to solution design, product customization and application integration all the way to guaranteed, cost effective application management and support. Marvel's mission is to ensure our clients' success with Oracle E-Business Suite by doing it the right way, every time. We use the proven Marvel MIM® a modified version of Oracle's AIM project methodology to help our clients successfully deploy Oracle technology worldwide, providing an integrated suite of professional services, integration software, training and managed services, from the strategy and design phases through implementation SUSPICIOUS EMAIL DETECTION 5
  • 6. and ongoing support. Our Applications consulting services: • Implementation Strategy and Planning • Upgrade Strategy and Planning • Build Versus Buy Decisions • License and Support Migration • Technology and Platform Migration • Server & Storage Consolidation • Architecture Strategy and Planning • Total Cost of Ownership (TCO) Reduction • Disaster Recovery Planning • E-Business Strategy • Merger & Acquisition IT Strategy and Planning. SUSPICIOUS EMAIL DETECTION 6
  • 7. The key Project Management Services we deliver are: • Project Chartering & Scoping • Resource Management • Financial Budget Management • Communication Management • Project Planning • Training Planning • Risk Management • Quality Management • Project Execution SUSPICIOUS EMAIL DETECTION 7
  • 8. INTRODUCTION SCOPE In this project, suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX, are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails. This is very useful in real-time scenario in which you can resume the anti-social activities. PURPOSE OF THE PROJECT SUSPICIOUS EMAIL DETECTION 8
  • 9. The purpose of the project is to suspect the E-mails which consist of offensive, anti-social elements and block them which help in identifying the suspicious user. OVERVIEW OF PROJECT 1)Login Module 2)Registration Module 3)Administration Module 4)Encryption Module 5)User Module 6)Mailing Module Login Module This module is used by administrator and users (who are authenticated) to login into the Colors mail. The login details of the specified person will be entered and hence can enter into the Colors mail. SUSPICIOUS EMAIL DETECTION 9
  • 10. Registration Module This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the Colors mail. Administration Module This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails. Encryption Module This module is used by the administrator to perform the functions like encryption of the `words. The encrypted words are sent to the database and hence managed by the administrator. User Module SUSPICIOUS EMAIL DETECTION 10
  • 11. This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message. Mailing Module This module is used by the users perform mailing system. The mailing system consists of composing the mails, sending the mails and checking out the mails in inbox.This module allows employees to register and manage patient details. When a request is made, an employee immediately dispatches an ambulance with available doctor and other attendants. Employee keeps track of patient status and in case of emergency consults a hospital for admitting the patient. LITERATURE SURVEY ABOUT JAVA SUSPICIOUS EMAIL DETECTION 11
  • 12. Initially the language was called as “oak” but it was renamed as “java” in 1995.The primary motivation of this language was the need for a platform-independent (i.e. architecture neutral) language that could be used to create software to be embedded in various consumer electronic devices. • Java is a programmer’s language • Java is cohesive and consistent • Except for those constraint imposed by the Internet environment. Java gives the programmer, full control Finally Java is to Internet Programming where c was to System Programming. Initially the language was called as “oak” but it was renamed as “java” in 1995.The primary motivation of this language was the need for a platform-independent (i.e. architecture neutral) language that could be used to SUSPICIOUS EMAIL DETECTION 12
  • 13. create software to be embedded in various consumer electronic devices. • Java is a programmer’s language • Java is cohesive and consistent • Except for those constraint imposed by the Internet environment. Java gives the programmer, full control Finally Java is to Internet Programming where c was to System Programming. APPLICATIONS AND APPLETS An application is a program that runs on our Computer under the operating system of that computer. It is more or less like one creating using C or C++ .Java’s ability to create Applets makes it important. An Applet I san application, designed to be transmitted over the Internet and executed by a Java-compatible web browser. An applet I actually a tiny Java program, dynamically downloaded across the network, just like SUSPICIOUS EMAIL DETECTION 13
  • 14. an image. But the difference is, it is an intelligent program, not just a media file. It can be react to the user input and dynamically change. JAVA ARCHITECTURE Java architecture provides a portable, robust, high performing environment for development. Java provides portability by compiling the byte codes for the Java Virtual Machine, which is then interpreted on each platform by the run-time environment. Java is a dynamic system, able to load code when needed from a machine in the same room or across the planet. COMPLILATION OF CODE SUSPICIOUS EMAIL DETECTION 14
  • 15. When you compile the code, the Java compiler creates machine code (called byte code) for a hypothetical machine called Java Virtual Machine (JVM). The JVM is supposed t executed the byte code. The JVM is created for the overcoming the issue of probability. The code is written and compiled for one machine and interpreted on all machines .This machine is called Java Virtual Machine. COMPILING AND INTERPRETING JAVA SOURCE CODE Java Pc Java Byte interpreter compiler code Java Macintosh interpreterm compiler Platform acintosh Source independ code ent SPARC Java Compiler interprete r(SPARC) SUSPICIOUS EMAIL DETECTION 15
  • 16. ))) During run-time the Java interpreter tricks the byte code file into thinking that it is running on a Java Virtual Machine. In reality this could be an Intel Pentium windows 95 or sun SPARCstation running Solaris or Apple Macintosh running system and all could receive code from any computer through internet and run the Applets. SERVLET INTRODUCTION A Servlet is a generic server extension. a Java class that can be loaded Dynamically to expand the functionality of a server. Servlets are commonly used with web servers.Where they can take the place CGI scripts. A servlet is similar to proprietary server extension, except that it runs inside a Java Virtual Machine (JVM) on the server, so it is safe and portable SUSPICIOUS EMAIL DETECTION 16
  • 17. Servlets operate solely within the domain of the server. Unlike CGI and Fast CGI, which use multiple processes to handle separate program or separate requests, separate threads within web server process handle all servlets. This means that servlets are all efficient and scalable. Servlets are portable; both across operating systems and also across web servers. Java Servlets offer the best possible platform for web application development. Servlets are used as replacement for CGI scripts on a web server,they can extend any sort of server such as a mail server that allows servlets extend its functionality perhaps by performing a virus scan on all attached documents or handling mail filtering tasks. For example an HTTP servlet can be used to generate dynamic HTML content when you use servlets to do dynamic content you get the following advantages: • They’re faster and cleaner then CGI scripts SUSPICIOUS EMAIL DETECTION 17
  • 18. • They use a standard API( the servlet API) • They provide all the advantages of Java (run on a variety of servers without needing to be rewritten. ADVANTAGES OF THE SERVLET API • One of the great advantages of the servlet API is protocol independent. It assumes nothing about: • The protocol being used to transmit on the net • How it is loaded • The server environment it will be running in • These quantities are important, because it allows the Servlet API to be embedded in many different kinds of servers. There are other advantages to the servlet. API as well These include: • It’s extensible-you can inherit all your functionality from the base classes made available to you • It’s simple small, and easy to use. FEATURES OF SERVLETS SUSPICIOUS EMAIL DETECTION 18
  • 19. • Servlets are persistent.Servlet are loaded only by the web server and can maintain services between requests. • Servlets are fast. Since servlets only need to be lloaded once, they offer much better performance over their CGI counterparts. • Servlets are platform independent. • Servlets are extensible Java is a robust, object- oriented programming language, which easily can be extended to suit your needs. • Servlets are secure • Servlets are used with a variety of client. LOADING SERVLETS Servlets can be loaded from their places. From a directory that is on the CLASSPATH. The CLASSPATH of the JavaWebServer includes service root/classes/, which is where the system classes reside Remote servlets can be loaded by SUSPICIOUS EMAIL DETECTION 19
  • 20. • Configuring the admin Tool to setup automatic loading of remote servlets. • Selectiong up server side include tags in .html files • Defining a filter chain Configuration INVOKING SERVLETS A Client can Invoke Servlets in the Following Ways: • The client can ask for a document that is served by the servlet. • The client(browser) can invoke the servlet directly using a URL, once it has been mapped using the SERVLET ALIASES Section of the admin GUI • The servlet can be invoked through server side include tags. • The servlet can be invoked by placing it in the servlets/directory • The servlet can be invoked by using it in a filter chain JSP SUSPICIOUS EMAIL DETECTION 20
  • 21. The first JavaServer Pages specification was released in 1999. Originally JSP was modeled after other server-side template technologies to provide a simple method of embedding dynamic code with static markup. When a request is made for the content of a JSP, a container interprets the JSP, executes any embedded code, and sends the results in a response. At the time this type of functionality was nothing terribly new, but it was and still is a helpful enhancement to Servlets. JSP LIFE CYCLE Much like Servlets, understanding JSP requires understanding the simple life cycle that JSP follows. JSP follows a three-phase life cycle: initialization, service, and destruction, as shown in Figure 3-1. This life cycle should seem familiar and is identical to the one described for Servlets. While a JSP does follow the Servlet life cycle, the methods have different names. Initialization SUSPICIOUS EMAIL DETECTION 21
  • 22. corresponds to the jspInit() method, service corresponds to the _jspService() method, and destruction corresponds to the jspDestroy() method. The three phases are all used the same as a Servlet and allow a JSP to load resources, provide service to multiple client requests, and destroy loaded resources when the JSP is taken out of service. JDBC WHAT IS JDBC? Any relational database. One can write a single program using the JDBC API, and the JDBC is a Java Api for executing SQL, Statements(As a point of SUSPICIOUS EMAIL DETECTION 22
  • 23. interest JDBC is trademarked name and is not an acronym; nevertheless, Jdbc is often thought of as standing for Java Database Connectivity. It consists of a set of classes and interfaces written in the Java Programming language. JDBC provides a standard API for tool/database developers and makes it possible to write database applications using a pure Java API WHAT DOES JDBC DO? • Establish a connection with a database • Send SQL statements • Process the results • JDBC Driver Types • The JDBC drivers that we are aware of this time fit into one of four categories • JDBC-ODBC Bridge plus ODBC driver • Native-API party-java driver • JDBC-Net pure java driver • Native-protocol pure Java driver SUSPICIOUS EMAIL DETECTION 23
  • 24. HTML Hypertext Markup Language (HTML), the languages of the worldwideweb (WWW), allows users to produces web pages that included text, graphics and pointer to other web pages (Hyperlinks). HTML is not a programming language but it is an application of ISO Standard 8879, SGML (Standard Generalized Markup Language), but Specialized to hypertext and adapted to the Web. The idea behind hypertext one point to another point. We can navigate through the information based on out interest and preference. A markup language is simply a series of items enclosed within the elements should be displayed. ADVANTAGES • A HTML document is small and hence easy to send over the net.It is small because it does not include formatted information. SUSPICIOUS EMAIL DETECTION 24
  • 25. • HTML is platform independent • HTML tags are not case-sensitive. JAVA SCRIPT The Java Script Language JavaScript is a compact, object-based scripting language for developing client and server internet applications. Netscape Navigator 2.0 interprets JavaScript statements embedded directly in an HTML page. and Livewire enables you to create server-based applications similar to common gateway interface (CGI) programs. In a client application for Navigator, JavaScript statements embedded in an HTML Page can recognize and respond to user events such as mouse clicks form Input, and page navigation. SYSTEM ANALYSIS EXISTING SYSTEM & DISADVANTAGES SUSPICIOUS EMAIL DETECTION 25
  • 26. In the existing system, the mails are sent to the authenticated users who are intended to be received. Some defects in existing system are: • Suspicious mails cannot be detected. • Offensive users cannot be identified. PROPOSED SYSTEM & ITS ADVANTAGES In the proposed system the suspicious users are detected and the offensive mails are blocked Features of proposed system: • This helps in finding out anti social elements. • This provides the security to system which adapts it. • This also helps the intelligence bureau, crime branch etc., • Insurance premium calculations, for quarterly, half yearly and annually is completely automated gives us a reliable environment. SUSPICIOUS EMAIL DETECTION 26
  • 27. • The system provides claim reporting and status enquiry. UML DIAGRAMS UNIFIED MODELING LANGUAGE The Unified Modeling Language allows the software engineer to express an analysis model using the modeling notation that is governed by a set of syntactic semantic and pragmatic rules.A UML system is represented using five different views that describe the system from distinctly different perspective. Each view is defined by a set of diagram, which is as follows. USER MODEL VIEW • This view represents the system from the users perspective. • The analysis representation describes a usage scenario from the end-users perspective. STRUCTURAL MODEL VIEW SUSPICIOUS EMAIL DETECTION 27
  • 28. In this model the data and functionality are arrived from inside the system. • This model view models the static structures. ENVIRONMENTAL MODEL VIEW In this the structural and behavioral aspects of the environment in which the system is to be implemented are represented. UML is specifically constructed through two different domains they are: • UML Analysis modeling, this focuses on the user model and structural model views of the system. DATA FLOW DIAGRAMS ADMIN SUSPICIOUS EMAIL DETECTION 28
  • 29. USER CLASS DIAGRAMS ADMIN Keywords Manage Keywords Add Keywords() Display Keywords() Admin Keywords Alert Mails Informative Block List Enter keywords() Alert Mails check mails() Informative Mails check mails() SUSPICIOUS EMAIL DETECTION 29
  • 30. Compose Mails composing the mail send the mail() Sent Mails User Sent items Mails check the sent items() Compose() send() Inbox Received mails check the received mails() SEQUENCE DIAGRAM ADMIN Admin Keywords Alert List Informative Manage Keywords Check Alert Mails Check Informative Mails USER User Compose Mails Inbox Sent Items Compose the mails to be sent Check the mails Check the sent mails SUSPICIOUS EMAIL DETECTION 30
  • 31. SYSTEM TESTING Testing is a process, which reveals errors in the program. It is the major quality measure employed during software development. During software development. During testing, the program is executed with a set of test cases and the output of the program for the test cases is evaluated to determine if the program is performing as it is expected to perform. TESTING IN STRATEGIES In order to make sure that the system does not have errors, the different levels of testing strategies that are applied at differing phases of software development are: UNIT TESTING Unit Testing is done on individual modules as they are completed and become executable. It is confined only to the designer's requirements. Each module can be tested using the following two Strategies: SUSPICIOUS EMAIL DETECTION 31
  • 32. INTEGRATING TESTING Integration testing ensures that software and subsystems work together a whole. It tests the interface of all the modules to make sure that the modules behave properly when integrated together. SYSTEM TESTING Involves in-house testing of the entire system before delivery to the user. It's aim is to satisfy the user the system meets all requirements of the client's specifications. TEST APPROACH Testing can be done in two ways: • Bottom up approach • Top down approach BOTTOM UP APPROACH Testing can be performed starting from smallest and lowest level modules and proceeding one at a time. For each module in bottom up testing a short program SUSPICIOUS EMAIL DETECTION 32
  • 33. executes the module and provides the needed data so that the module is asked to perform the way it will when embedded with in the larger system. When bottom level modules are tested attention turns to those on the next level that use the lower level ones they are tested individually and then linked with the previously examined lower level modules. TOP DOWN APPROACH This type of testing starts from upper level modules. Since the detailed activities usually performed in the lower level routines are not provided stubs are written. A stub is a module shell called by upper level module and that when reached properly will return a message to the calling module indicating that proper interaction occurred. No attempt is made to verify the correctness of the lower level module. VALIDATION The system has been tested and implemented successfully and thus ensured that all the requirements SUSPICIOUS EMAIL DETECTION 33
  • 34. as listed in the software requirements specification are completely fulfilled. In case of erroneous input corresponding error messages are displayed DISCUSSION OF SCREENS HOME PAGE ADMIN’S LOGIN PAGE ADMIN’S LOGIN PAGE SUSPICIOUS EMAIL DETECTION 34
  • 35. ADDING A KEYWORD DISPLAYING THE KEYWORD USER’S REGISTRATION SUSPICIOUS EMAIL DETECTION 35
  • 36. USER’S LOGIN USER’S LOGIN PAGE ALERT LIST OF BLOCKED MAILS IN ADMIN PAGE SUSPICIOUS EMAIL DETECTION 36
  • 37. Fig 7.4.9 Here are the mails which had been got blocked in admin’s page due to hazardous information in the mail CONCLUSION AND FUTURE ENHANCEMENTS CONCLUSION Email has been an efficient and popular communication mechanism as the number of Internet user's increase. In many security informatics applications it is important to detect deceptive communication in email. In this application the mails are classified as suspicious or normal using the key SUSPICIOUS EMAIL DETECTION 37
  • 38. words and encrypted keywords. The mails containing these keywords and encrypted keywords are classified as suspicious mails and they can be blocked and verified by the administrator. The proposed work will be helpful for identifying the suspicious email and also assist the investigators to get the information in time to take effective actions to reduce the criminal activities. FUTURE ENHANCEMENTS Even though the project fulfills the requirements of the present application there is always scope for further work. According to the emerging changes and new versions, further work can be done to improve the application Since project is designed in a flexible software. This application which is a web based is of standalone application. This can be implemented on internet by buying the network space and by creating a website. SUSPICIOUS EMAIL DETECTION 38
  • 39. The present application when implemented on internet requires a large database as the backend; this can be done by using the MySql database as the backend. BIBILOGRAPHY • http://www.marvel.ae/html/Marvel %20Company%20profile.pdf • Java • Html • Jsp • Java script • Jdbc • servlet • oracle SUSPICIOUS EMAIL DETECTION 39
  • 40. www.w3professors.com SUSPICIOUS EMAIL DETECTION 40