Professional Documents
Culture Documents
Modelling and Analysis On The Propagation Dynamics of Email Malware
Modelling and Analysis On The Propagation Dynamics of Email Malware
Modelling and Analysis On The Propagation Dynamics of Email Malware
BATCH NO : 29
DONE BY :
ELIZABETH.M -311416104019
GUIDED BY : -311416104024
Mrs. THIRUPURASUNDARI.D.R, M.E., (Ph.D) HEMAVATHY.
JASMINE JULIAT.Y -311416104025
HOD/CSE B
KIRUTHIKA.S -311416104031
• OBJECTIVE
• ABSTRACT
• LITERATURE SURVEY
• EXISTING SYSTEM
• PROPOSED SYSTEM
• REFERENCES
OBJECTIVE
To detect email malware bots and block spamming bots in sender side with the
• They are good at filtering spam for end users, but spam messages still keep
• Due to the huge number of email addresses observed in the SMTP sessions, storing and
5. Sanjeev das, Yang liu, Wei zhang, • Highly parallel Algorithm • Online malware detection. • Non Effective
Mahintham Chandramohan “Semantics- • Exploit system vulnerabilities.
based Online Malware Detection: Towards
Efficient Real-time Protection Against
Malware”,2015
EXISTING SYSTEM
• Email with attachments such as.exe, .dll, .pif, .scr, .js files, documents ,video links
• Word net dictionary is used to find unwanted, out of dictionary and unparliament words.
• Bloom filter technique is used to detect repeated spam mails and filters spam
messages
ARCHITECTURE – PROPOSED SYSTEM
ADVANTAGES
• Performance Enhancement.
• Parallel processing.
MODULES
• Reinfection
• Word Scrutinizer
• Blocking Spambots
REINFECTION
• After the successful login, the user goes to view the compose page.
• A user may get infected whenever the user visits malicious hyperlink or
attachments.
• Email attachments such as .exe, .dll files will be detected.
• The user can also use the chat option for a closed group of people.
SEQUENCE DIAGRAM
1. Login
2. Compose Mail
3. Detect Malware
4. Update
5. Alert Message
Compose Page Group Chat page
WORD SCRUTINIZER
• Based on REA and senders network, a network administrator monitors the count of
blocked mails.
• If the count exceeds more than 10, the network administrator blocks the spam bot.
• After blocking, the spam bot cannot access his/her account.
• After providing proper authentication, the blocked account will be unblocked by
network administrator.
ACTIVITY DIAGRAM
Block Spambot
SYSTEM REQUIRMENTS
SOFTWARE REQUIRMENTS:
HARDWARE REQUIRMENTS:
• Processor : Pentium IV
• Hard Disk : 260 GB
• RAM : 4GB or more
CONCLUSION AND FUTURE ENHANCEMENT