Top Banner
SUMMETR INTERNSHIP ON HARMFUL MAIL SCANNING By N.KIRAN KUMAR(10100350) CSE SUSPICIOUS EMAIL DETECTION 1
58
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Summerinternship

SUMMETR INTERNSHIP

ON

HARMFUL MAIL SCANNING

By

N.KIRAN KUMAR(10100350)

CSE

SUSPICIOUS EMAIL DETECTION 1

Page 2: Summerinternship

CONTENTS

1:COMPANY PROFILE

2:INTRODUCTION

2.1:SCOPE

2.2:PURPOSE OF PROJECT

2.3:OVERVIEW

2.4:ARCHITECTURE

3:LITERATURE STUDY

3.1:JAVA

3.2:SERVLET

3.3:JSP

3.4:JDBC

3.5:ORACLE

3.6:NORMALIZATION

3.7:HTML

3.8:JAVA SCRIPT

4:SYSTEM ANALYSIS

4.1:EXISTING SYSTEM & DISADVANTAGE

4.2:PROPOSED SYSTEM & ADVANTAGES

SUSPICIOUS EMAIL DETECTION 2

Page 3: Summerinternship

5:SYSTEM DIAGRAM

5.1:UML DIAGRAMS

5.2:DATA FLOW DIAGRAMS

5.3:CLASS DIAGRAMS

5.4:SEQUENCE DIAGRAMS

6:SYSTEM TESTING

6.1:UNIT TESTING

6.2:INTEGRATION TESTING

6.3:SYSTEM TESTING

6.4:ACCEPTANCE TESTING

6.5:VALIDATION

7:SCREENS

8:CONCLUSION

9:FUTURE ENHANEMENTS

10:BIBILOGRAPY

SUSPICIOUS EMAIL DETECTION 3

Page 4: Summerinternship

COMPANY PROFILE

We are Oracle specialists, providing Oracle Applications services for over a decade. Our

Oracle Center of Excellence at Dubai and Hyderabad

provides highly effective solutions to help our clients

optimize their investments in Oracle products. With a

large pool of certified Oracle experts, we provide end-

to-end Oracle E-Business Suite solutions including

implementations, upgrades, and application

management services such as hosting, remote DBA,

help desk, archive and purge services, and a broad

range of other technical services.

SUSPICIOUS EMAIL DETECTION 4

Page 5: Summerinternship

Our long-term product engineering development

relationship with Oracle Middle East and off late with

Oracle India and recognition as Global Certified

Partner differentiates us from other services

providers, giving us thorough knowledge of the

product suite complementing our deep domain

experience to satisfy our customers diverse needs

from implementation and upgrades to solution

design, product customization and application

integration all the way to guaranteed, cost effective

application management and support.

Marvel's mission is to ensure our clients'

success with Oracle E-Business Suite by doing it the

right way, every time. We use the proven Marvel

MIM® a modified version of Oracle's AIM project

methodology to help our clients successfully deploy

Oracle technology worldwide, providing an

integrated suite of professional services, integration

software, training and managed services, from the

strategy and design phases through implementation

SUSPICIOUS EMAIL DETECTION 5

Page 6: Summerinternship

and ongoing support.

Our Applications consulting services:

• Implementation Strategy and Planning

• Upgrade Strategy and Planning

• Build Versus Buy Decisions

• License and Support Migration

• Technology and Platform Migration

• Server & Storage Consolidation

• Architecture Strategy and Planning

• Total Cost of Ownership (TCO) Reduction

• Disaster Recovery Planning

• E-Business Strategy

• Merger & Acquisition IT Strategy and Planning.

SUSPICIOUS EMAIL DETECTION 6

Page 7: Summerinternship

The key Project Management Services we deliver are:

• Project Chartering & Scoping

• Resource Management

• Financial Budget Management

• Communication Management

• Project Planning

• Training Planning

• Risk Management

• Quality Management

• Project Execution

SUSPICIOUS EMAIL DETECTION 7

Page 8: Summerinternship

INTRODUCTION

SCOPE

In this project, suspicious users are identified by

determining the keywords used by him/her. The

keywords such as bomb, RDX, are found in the mails

which are sent by the user. All these blocked mails are

checked by the administrator and identify the users who

sent such mails. This is very useful in real-time

scenario in which you can resume the anti-social

activities.

PURPOSE OF THE PROJECT

SUSPICIOUS EMAIL DETECTION 8

Page 9: Summerinternship

The purpose of the project is to suspect the E-mails

which consist of offensive, anti-social elements and

block them which help in identifying the suspicious

user.

OVERVIEW OF PROJECT

1)Login Module

2)Registration Module

3)Administration Module

4)Encryption Module

5)User Module

6)Mailing Module

Login Module

This module is used by administrator and users

(who are authenticated) to login into the Colors mail.

The login details of the specified person will be entered

and hence can enter into the Colors mail.

SUSPICIOUS EMAIL DETECTION 9

Page 10: Summerinternship

Registration Module

This module is used by the unauthenticated users

who are unregistered. The users must register

themselves such that they can login into the Colors

mail.

Administration Module

This module is used by the administrator

to perform the functions like managing the keywords,

entering new keywords and to check out the block list

of the discarded mails.

Encryption Module

This module is used by the administrator to

perform the functions like encryption of the `words.

The encrypted words are sent to the database and hence

managed by the administrator.

User Module

SUSPICIOUS EMAIL DETECTION 10

Page 11: Summerinternship

This module is used by the users to do

operations like composing mail, checking out the mails

in inbox and finally sending the mails to the

authenticated users by attaching a message.

Mailing Module

This module is used by the users perform

mailing system. The mailing system consists of

composing the mails, sending the mails and checking

out the mails in inbox.This module allows employees to

register and manage patient details. When a request is

made, an employee immediately dispatches an

ambulance with available doctor and other attendants.

Employee keeps track of patient status and in case of

emergency consults a hospital for admitting the patient.

LITERATURE SURVEY

ABOUT JAVA

SUSPICIOUS EMAIL DETECTION 11

Page 12: Summerinternship

Initially the language was called as “oak” but it was

renamed as “java” in 1995.The primary motivation of

this language was the need for a platform-independent

(i.e. architecture neutral) language that could be used to

create software to be embedded in various consumer

electronic devices.

Java is a programmer’s language

Java is cohesive and consistent

Except for those constraint imposed by the

Internet environment. Java gives the

programmer, full control

Finally Java is to Internet Programming where c

was to System Programming.

Initially the language was called as “oak” but it was

renamed as “java” in 1995.The primary motivation of

this language was the need for a platform-independent

(i.e. architecture neutral) language that could be used to

SUSPICIOUS EMAIL DETECTION 12

Page 13: Summerinternship

create software to be embedded in various consumer

electronic devices.

Java is a programmer’s language

Java is cohesive and consistent

Except for those constraint imposed by the

Internet environment. Java gives the

programmer, full control

Finally Java is to Internet Programming where c

was to System Programming.

APPLICATIONS AND APPLETS

An application is a program that runs on our

Computer under the operating system of that computer.

It is more or less like one creating using C or C+

+ .Java’s ability to create Applets makes it important.

An Applet I san application, designed to be transmitted

over the Internet and executed by a Java-compatible

web browser. An applet I actually a tiny Java program,

dynamically downloaded across the network, just like

SUSPICIOUS EMAIL DETECTION 13

Page 14: Summerinternship

an image. But the difference is, it is an intelligent

program, not just a media file. It can be react to the user

input and dynamically change.

JAVA ARCHITECTURE Java architecture

provides a portable, robust, high performing

environment for development. Java provides portability

by compiling the byte codes for the Java Virtual

Machine, which is then interpreted on each platform by

the run-time environment. Java is a dynamic system,

able to load code when needed from a machine in the

same room or across the planet.

COMPLILATION OF CODE

SUSPICIOUS EMAIL DETECTION 14

Page 15: Summerinternship

When you compile the code, the Java compiler

creates machine code (called byte code) for a

hypothetical machine called Java Virtual Machine

(JVM). The JVM is supposed t executed the byte code.

The JVM is created for the overcoming the issue of

probability. The code is written and compiled for one

machine and interpreted on all machines .This machine

is called Java Virtual Machine.

COMPILING AND INTERPRETING JAVA

SOURCE CODE

During run-time the Java interpreter tricks the

byte code file into thinking that it is running on a Java

SUSPICIOUS EMAIL DETECTION

Source code

Pc compiler

Macintosh compiler

SPARC Compiler

Java Byte code

Platform independ

ent

Java interpreter

Java interpreterm

acintosh

)))

Java interpreter(SPARC

)

15

Page 16: Summerinternship

Virtual Machine. In reality this could be an Intel

Pentium windows 95 or sun SPARCstation running

Solaris or Apple Macintosh running system and all

could receive code from any computer through

internet and run the Applets.

SERVLET

INTRODUCTION

A Servlet is a generic server extension. a Java class

that can be loaded Dynamically to expand the

functionality of a server. Servlets are commonly used

with web servers.Where they can take the place CGI

scripts.

A servlet is similar to proprietary server

extension, except that it runs inside a Java Virtual

Machine (JVM) on the server, so it is safe and portable

Servlets operate solely within the domain of the server.

Unlike CGI and Fast CGI, which use multiple

processes to handle separate program or separate

SUSPICIOUS EMAIL DETECTION 16

Page 17: Summerinternship

requests, separate threads within web server process

handle all servlets. This means that servlets are all

efficient and scalable. Servlets are portable; both across

operating systems and also across web servers. Java

Servlets offer the best possible platform for web

application development.

Servlets are used as replacement for CGI scripts

on a web server,they can extend any sort of server such

as a mail server that allows servlets extend its

functionality perhaps by performing a virus scan on all

attached documents or handling mail filtering tasks.

For example an HTTP servlet can be used to

generate dynamic HTML content when you use servlets

to do dynamic content you get the following

advantages:

They’re faster and cleaner then CGI scripts

They use a standard API( the servlet API)

SUSPICIOUS EMAIL DETECTION 17

Page 18: Summerinternship

They provide all the advantages of Java (run on a

variety of servers without needing to be

rewritten.

ADVANTAGES OF THE SERVLET API

One of the great advantages of the servlet API is

protocol independent. It assumes nothing about:

The protocol being used to transmit on the net

How it is loaded

The server environment it will be running in

These quantities are important, because it allows

the Servlet API to be embedded in many different

kinds of servers. There are other advantages to the

servlet. API as well These include:

It’s extensible-you can inherit all your functionality

from the base classes made available to you

It’s simple small, and easy to use.

FEATURES OF SERVLETS

SUSPICIOUS EMAIL DETECTION 18

Page 19: Summerinternship

Servlets are persistent.Servlet are loaded only by

the web server and can maintain services between

requests.

Servlets are fast. Since servlets only need to be l\

loaded once, they offer much better performance

over their CGI counterparts.

Servlets are platform independent.

Servlets are extensible Java is a robust, object-

oriented programming language, which easily can

be extended to suit your needs.

Servlets are secure

Servlets are used with a variety of client.

LOADING SERVLETS

Servlets can be loaded from their places. From a

directory that is on the CLASSPATH. The

CLASSPATH of the JavaWebServer includes service

root/classes/, which is where the system classes reside

Remote servlets can be loaded by

SUSPICIOUS EMAIL DETECTION 19

Page 20: Summerinternship

Configuring the admin Tool to setup automatic

loading of remote servlets.

Selectiong up server side include tags in .html files

Defining a filter chain Configuration

INVOKING SERVLETS

A Client can Invoke Servlets in the Following Ways:

The client can ask for a document that is served by

the servlet.

The client(browser) can invoke the servlet directly

using a URL, once it has been mapped using the

SERVLET ALIASES Section of the admin GUI

The servlet can be invoked through server side

include tags.

The servlet can be invoked by placing it in the

servlets/directory

The servlet can be invoked by using it in a filter

chain

JSP

SUSPICIOUS EMAIL DETECTION 20

Page 21: Summerinternship

The first JavaServer Pages specification was

released in 1999. Originally JSP was modeled after

other server-side template technologies to provide a

simple method of embedding dynamic code with static

markup. When a request is made for the content of a

JSP, a container interprets the JSP, executes any

embedded code, and sends the results in a response. At

the time this type of functionality was nothing terribly

new, but it was and still is a helpful enhancement to

Servlets.

JSP LIFE CYCLE

Much like Servlets, understanding JSP requires

understanding the simple life cycle that JSP follows.

JSP follows a three-phase life cycle: initialization,

service, and destruction, as shown in Figure 3-1. This

life cycle should seem familiar and is identical to the

one described for Servlets.

While a JSP does follow the Servlet life cycle, the

methods have different names. Initialization

SUSPICIOUS EMAIL DETECTION 21

Page 22: Summerinternship

corresponds to the jspInit() method, service corresponds

to the _jspService() method, and destruction

corresponds to the jspDestroy() method. The three

phases are all used the same as a Servlet and allow a

JSP to load resources, provide service to multiple client

requests, and destroy loaded resources when the JSP is

taken out of service.

JDBC

WHAT IS JDBC?

Any relational database. One can write a single

program using the JDBC API, and the JDBC is a Java

Api for executing SQL, Statements(As a point of

SUSPICIOUS EMAIL DETECTION 22

Page 23: Summerinternship

interest JDBC is trademarked name and is not an

acronym; nevertheless, Jdbc is often thought of as

standing for Java Database Connectivity. It consists of a

set of classes and interfaces written in the Java

Programming language. JDBC provides a standard API

for tool/database developers and makes it possible to

write database applications using a pure Java API

WHAT DOES JDBC DO?

Establish a connection with a database

Send SQL statements

Process the results

JDBC Driver Types

The JDBC drivers that we are aware of this time fit

into one of four categories

JDBC-ODBC Bridge plus ODBC driver

Native-API party-java driver

JDBC-Net pure java driver

Native-protocol pure Java driver

SUSPICIOUS EMAIL DETECTION 23

Page 24: Summerinternship

HTML

Hypertext Markup Language (HTML), the

languages of the worldwideweb (WWW), allows users

to produces web pages that included text, graphics and

pointer to other web pages (Hyperlinks).

HTML is not a programming language but it is an

application of ISO Standard 8879, SGML (Standard

Generalized Markup Language), but Specialized to

hypertext and adapted to the Web. The idea behind

hypertext one point to another point. We can navigate

through the information based on out interest and

preference. A markup language is simply a series of

items enclosed within the elements should be displayed.

ADVANTAGES

A HTML document is small and hence easy to send

over the net.It is small because it does not include

formatted information.

SUSPICIOUS EMAIL DETECTION 24

Page 25: Summerinternship

HTML is platform independent

HTML tags are not case-sensitive.

JAVA SCRIPT

The Java Script Language JavaScript is a compact,

object-based scripting language for developing client

and server internet applications. Netscape Navigator 2.0

interprets JavaScript statements embedded directly in an

HTML page. and Livewire enables you to create server-

based applications similar to common gateway interface

(CGI) programs.

In a client application for Navigator, JavaScript

statements embedded in an HTML Page can recognize

and respond to user events such as mouse clicks form

Input, and page navigation.

SYSTEM ANALYSIS

EXISTING SYSTEM & DISADVANTAGES

SUSPICIOUS EMAIL DETECTION 25

Page 26: Summerinternship

In the existing system, the mails are sent to the

authenticated users who are intended to be received.

Some defects in existing system are:

Suspicious mails cannot be detected.

Offensive users cannot be identified.

PROPOSED SYSTEM & ITS

ADVANTAGES

In the proposed system the suspicious users are

detected and the offensive mails are blocked

Features of proposed system:

This helps in finding out anti social elements.

This provides the security to system which adapts

it.

This also helps the intelligence bureau, crime

branch etc.,

Insurance premium calculations, for quarterly, half

yearly and annually is completely automated gives

us a reliable environment.

SUSPICIOUS EMAIL DETECTION 26

Page 27: Summerinternship

The system provides claim reporting and status

enquiry.

UML DIAGRAMS

UNIFIED MODELING LANGUAGE

The Unified Modeling Language allows the

software engineer to express an analysis model using

the modeling notation that is governed by a set of

syntactic semantic and pragmatic rules.A UML system

is represented using five different views that describe

the system from distinctly different perspective. Each

view is defined by a set of diagram, which is as follows.

USER MODEL VIEW

This view represents the system from the users

perspective.

The analysis representation describes a usage

scenario from the end-users perspective.

STRUCTURAL MODEL VIEW

In this model the data and functionality are

SUSPICIOUS EMAIL DETECTION 27

Page 28: Summerinternship

arrived from inside the system.

This model view models the static structures.

ENVIRONMENTAL MODEL VIEW

In this the structural and behavioral

aspects of the environment in which the

system is to be implemented are represented.

UML is specifically constructed

through two different domains they are:

UML Analysis modeling, this focuses on

the user model and structural model views

of the system.

DATA FLOW DIAGRAMS

ADMIN

SUSPICIOUS EMAIL DETECTION 28

Page 29: Summerinternship

USER

CLASS DIAGRAMS

ADMIN

Keywords

Manage Keywords

Add Keywords()Display Keywords()

Admin

KeywordsAlert MailsInformative

Enter keywords()check mails()

Block List

Alert MailsInformative Mails

check mails()

SUSPICIOUS EMAIL DETECTION 29

Page 30: Summerinternship

Compose Mails

composing the mail

send the mail()

Sent Mails

Sent items

check the sent items()

User

Mails

Compose()send()

Inbox

Received mails

check the received mails()

SEQUENCE DIAGRAM

ADMIN

Admin Keywords Alert List Informative

Manage Keywords

Check Alert Mails

Check Informative Mails

USER

User Compose Mails Inbox Sent Items

Compose the mails to be sent

Check the mails

Check the sent mails

SUSPICIOUS EMAIL DETECTION 30

Page 31: Summerinternship

SYSTEM TESTING

Testing is a process, which reveals errors in the

program. It is the major quality measure employed

during software development. During software

development. During testing, the program is

executed with a set of test cases and the output of the

program for the test cases is evaluated to determine if

the program is performing as it is expected to perform.

TESTING IN STRATEGIES

In order to make sure that the system does not

have errors, the different levels of testing strategies that

are applied at differing phases of software development

are:

UNIT TESTING

Unit Testing is done on individual modules as they

are completed and become executable. It is confined

only to the designer's requirements. Each module can be

tested using the following two Strategies:

SUSPICIOUS EMAIL DETECTION 31

Page 32: Summerinternship

INTEGRATING TESTING

Integration testing ensures that software and

subsystems work together a whole. It tests the interface

of all the modules to make sure that the modules

behave properly when integrated together.

SYSTEM TESTING

Involves in-house testing of the entire system

before delivery to the user. It's aim is to satisfy the user

the system meets all requirements of the client's

specifications.

TEST APPROACH

Testing can be done in two ways:

Bottom up approach

Top down approach

BOTTOM UP APPROACH

Testing can be performed starting from smallest

and lowest level modules and proceeding one at a time.

For each module in bottom up testing a short program

SUSPICIOUS EMAIL DETECTION 32

Page 33: Summerinternship

executes the module and provides the needed data so

that the module is asked to perform the way it will

when embedded with in the larger system. When

bottom level modules are tested attention turns to those

on the next level that use the lower level ones they are

tested individually and then linked with the previously

examined lower level modules.

TOP DOWN APPROACH

This type of testing starts from upper level

modules. Since the detailed activities usually performed

in the lower level routines are not provided stubs are

written. A stub is a module shell called by upper level

module and that when reached properly will return a

message to the calling module indicating that proper

interaction occurred. No attempt is made to verify the

correctness of the lower level module.

VALIDATION

The system has been tested and implemented

successfully and thus ensured that all the requirements

SUSPICIOUS EMAIL DETECTION 33

Page 34: Summerinternship

as listed in the software requirements specification are

completely fulfilled. In case of erroneous input

corresponding error messages are displayed

DISCUSSION OF SCREENS

HOME PAGE

ADMIN’S LOGIN PAGE

ADMIN’S LOGIN PAGE

SUSPICIOUS EMAIL DETECTION 34

Page 35: Summerinternship

ADDING A KEYWORD

DISPLAYING THE KEYWORD

USER’S REGISTRATION

SUSPICIOUS EMAIL DETECTION 35

Page 36: Summerinternship

USER’S LOGIN

USER’S LOGIN PAGE

ALERT LIST OF BLOCKED MAILS IN

ADMIN PAGE

SUSPICIOUS EMAIL DETECTION 36

Page 37: Summerinternship

Fig 7.4.9

Here are the mails which had

been got blocked in admin’s page due to hazardous

information in the mail

CONCLUSION AND FUTURE

ENHANCEMENTS

CONCLUSION

Email has been an efficient and popular

communication mechanism as the number of Internet

user's increase. In many security informatics

applications it is important to detect deceptive

communication in email.  In this application the mails

are classified as suspicious or normal using the key

SUSPICIOUS EMAIL DETECTION 37

Page 38: Summerinternship

words and encrypted keywords. The mails containing

these keywords and encrypted keywords are classified

as suspicious mails and they can be blocked and

verified by the administrator. The proposed work will

be helpful for identifying the suspicious email and also

assist the investigators to get the information in time to

take effective actions to reduce the criminal activities.

FUTURE ENHANCEMENTS

Even though the project fulfills the requirements

of the present application there is always scope for

further work. According to the emerging changes and

new versions, further work can be done to improve the

application Since project is designed in a flexible

software.

This application which is a web based is of

standalone application. This can be implemented on

internet by buying the network space and by creating a

website.

SUSPICIOUS EMAIL DETECTION 38

Page 39: Summerinternship

The present application when implemented on

internet requires a large database as the backend; this

can be done by using the MySql database as the

backend.

BIBILOGRAPHY

http://www.marvel.ae/html/Marvel

%20Company%20profile.pdf

Java

Html

Jsp

Java script

Jdbc

servlet

oracle

SUSPICIOUS EMAIL DETECTION 39

Page 40: Summerinternship

www.w3professors.com

SUSPICIOUS EMAIL DETECTION 40