Suspicious Mail Detection System
Shashank pal, Ravinder Ahuja
Decision Tree; mail Recognition; Training Datasets; ID3 Algorithm; substancial databases; suspected mails; administrator; extrapolation;
The apply of gazing substantial previous knowledgebases therefore on turn out new data and relationship among them. during this paper a call tree in categorizing the suspected mail recognition (emails concerning crimes). seeable of the hypothesis of fraud a suspicious email can have suspicious words and action words. The words like attack, hijack, RDX, bomb, etc represent the suspicious and action words. we tend to connected this hypothesis to the mail coaching dataset then connected ID3 rule to make the choice tree. the choice tree then is used to reason the mail as suspicious or not. Specifically, we tend to square measure keen on recognizing crimes from such info. E-mail communication has become a section of standard of living for uncountable individuals and has modified the means we tend to work. So, it's important to develop such system to stop and suspect the criminal activities over the web. The users of this technique square measure compose mails to the opposite users World Health Organization square measure documented already. If the composed mails contains the keywords like bomb, RDX, Terrorist etc. These suspected mails square measure blocked or discarded by the administrator in order that they can not be forwarded. this technique is intended such how that the users will simply act with the system with minimum information to browse the web.
Article Details
Unique Paper ID: 150000

Publication Volume & Issue: Volume 7, Issue 2

Page(s): 138 - 141
Article Preview & Download

Share This Article

Conference Alert


AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2021

SWEC- Management


Last Date: 7th November 2021

Go To Issue

Call For Paper

Volume 8 Issue 4

Last Date 25 September 2021

About Us enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on

Social Media

Google Verified Reviews

Contact Details