CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Advance Mailing System for the Detection of Malicious Network Activities

by Harsh Gupta, Sarthak Yadav, Shalendra Dhariwal, Vinod Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 4
Year of Publication: 2021
Authors: Harsh Gupta, Sarthak Yadav, Shalendra Dhariwal, Vinod Kumar
10.5120/ijca2021921330

Harsh Gupta, Sarthak Yadav, Shalendra Dhariwal, Vinod Kumar . Advance Mailing System for the Detection of Malicious Network Activities. International Journal of Computer Applications. 183, 4 ( May 2021), 31-34. DOI=10.5120/ijca2021921330

@article{ 10.5120/ijca2021921330,
author = { Harsh Gupta, Sarthak Yadav, Shalendra Dhariwal, Vinod Kumar },
title = { Advance Mailing System for the Detection of Malicious Network Activities },
journal = { International Journal of Computer Applications },
issue_date = { May 2021 },
volume = { 183 },
number = { 4 },
month = { May },
year = { 2021 },
issn = { 0975-8887 },
pages = { 31-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number4/31918-2021921330/ },
doi = { 10.5120/ijca2021921330 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:15:53.491976+05:30
%A Harsh Gupta
%A Sarthak Yadav
%A Shalendra Dhariwal
%A Vinod Kumar
%T Advance Mailing System for the Detection of Malicious Network Activities
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 4
%P 31-34
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

From the word fishing, the term malicious is derived. The idea concentrated upon the anti-malicious algorithm of the final host, The Link Guard, which uses basic elements of the links in the malicious attacks, involves the act of attracting users to visit a fake website by sending false emails to obtain the private information of the victim (for example, personal and financial information). To locate the malicious messages sent by the fraudster to get the target person's details, the link guard algorithm is used. The properties of malicious hyperlinks are the basis of this algorithm. The algorithm is adopted by all users, allowing users to identify such malicious emails and prevent any malicious attacks. Both visible and invisible attacks can be identified and avoided because the Connection Guard Algorithm is a property-based algorithm. The project utilizes PHP and MYSQL technologies.

References
  1. Online detection and prevention of phishing , University/Mathematical and Computer Sciences/Information Technology/Information Systems, 2011-01-03
  2. PHP documentation.
  3. MYSQL documentation available at https://www.dev.mysql.com/docs
  4. CSS ducmentation at https://developer.mozilla.org/docs
  5. 6 common phishing attacks and how to protect against them.
  6. What is phishing available at https://www.phishing.org/what-is-phishing
  7. E-mail Architectutre https://bachelorstudy.in/e-mail-architecture/
  8. How to manage MYSQL databases,users and Tables from the Command Line.
  9. Login and Signup using PHP and MYSQl with validation. https://www.studentstutorial.com/php/signup-login-form-in-php-mysql.php.
Index Terms

Computer Science
Information Sciences

Keywords

Phishing Malicious Email Attack Prevention