Bsc. Thesis Template
Total Page:16
File Type:pdf, Size:1020Kb
Malicious Email Detection & Filtering System Using Bayesian Machine Learning Algorithm Authors Rao Muhammad Umer 10CS61 2010-IU-967 Tayyeb Islam 10CS76 2010-IU-972 Awais Anwar 10CS119 2010-IU-994 Hussain Ahmed Madni 10CS67 2010-IU-970 Supervisor Engr. Khurram Hameed Lecturer DEPARTMENT OF COMPUTER SYSTEM ENGINEERING UNIVERSITY COLLEGE OF ENGINEERING AND TECHNOLOGY The Islamia University of Bahawalpur 2010-2014 i Malicious Email Detection & Filtering System Using Bayesian Machine Learning Algorithm Authors Rao Muhammad Umer 10CS61 2010-IU-967 Tayyeb Islam 10CS76 2010-IU-972 Awais Anwar 10CS119 2010-IU-994 Hussain Ahmed Madni 10CS67 2010-IU-970 A thesis submitted in partial fulfillment of the requirements for the degree of B.Sc. Computer System Engineering Supervisor Engr. Khurram Hameed Lecturer (UCET-IUB) External Examiner Signature: ________________________________________ Thesis Supervisor Signature: ________________________________________ DEPARTMENT OF COMPUTER SYSTEM ENGINEERING UNIVERSITY COLLEGE OF ENGINEERING AND TECHNOLOGY The Islamia University of Bahawalpur 2010-2014 ii ABSTRACT Suspicious or Malicious E-mail detection is a kind of mailing system where suspicious users are identified by determining the keywords used by someone. The keywords such as bomb, RDX and attached harmful files are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails. Malicious E-mail is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content. 1 UNDERTAKING I certify that research work titled “Malicious Email Detection & Filtering System Using Bayesian Machine Learning Algorithm” is my own work. The work has not been presented elsewhere for assessment. Where material has been used from other sources it has been properly acknowledged/referred. Signature of Students Rao Muhammad Umer 10CS61 ……………….. 2010-IU-967 Tayyeb Islam 10CS76 …………….…………….. 2010-IU-972 Awais Anwar 10CS119 ………………………… 2010-IU-994 Hussain Ahmed Madni 10CS67 ……………………………… 2010-IU-970 2 ACKNOWLEDGEMENTS We are grateful to Allah Almighty who provided us with this wonderful concept and bestowed us the ability to complete it successfully. We are thankful to our parents for their constant support and their financial help as the project wouldn’t have been successful without their motivation and prayers. We are grateful to our supervisor Engr. Khurram Hameed who helped us out of many hitches and provided us guidance at many instances and motivated us to carry on our work which obviously resulted in successful completion of our project. And finally, we thank all the faculty members of this great institution that helped us over the course of our studies. This project wouldn’t have been made without their support. 3 Table of Contents UNdertaking ....................................................................................................................... 2 Acknowledgements ............................................................................................................. 3 List of figures...................................................................................................................... 9 Chapter 1 .......................................................................................................................... 12 1.1Statement of the Problem ................................................................................................................................... 12 1.2 Objectives............................................................................................................................................................. 13 1.3 Block Diagram .................................................................................................................................................... 14 Chapter 2 .......................................................................................................................... 15 2.1 Login Module ...................................................................................................................................................... 15 2.2Registration Module ............................................................................................................................................ 16 2.3 Administration Module...................................................................................................................................... 16 2.4 Encryption Module ............................................................................................................................................. 17 2.5 User Module ........................................................................................................................................................ 18 Chapter 3 .......................................................................................................................... 19 3.1 N-Tier Architecture ............................................................................................................................................ 19 3.1.1 2-Tier and 3-Tier Architecture ...................................................................................................................... 19 3.2 MVC Architecture .............................................................................................................................................. 21 3.2.1 Model-1 ............................................................................................................................................................. 21 3.2.2 Model-2(MVC) ................................................................................................................................................ 21 3.2.3 Advantages of MVC...................................................................................................................................... 23 Chapter 4 .......................................................................................................................... 24 4.1 Agile software Development ............................................................................................................................ 24 4.1.1 Manifesto for Agile Software Development ............................................................................................... 24 4.1.2 Comparison between Water Fall and Agile Software Process Model.................................................... 24 4.2 Scrum .................................................................................................................................................................... 25 4.2.1 User Story ......................................................................................................................................................... 26 4.3 Test Driven Development (TDD) .................................................................................................................... 28 4.3.1Software for TDD ............................................................................................................................................. 28 4.3.2 The Three Laws of TDD ................................................................................................................................ 28 Chapter 5 .......................................................................................................................... 30 5.1 Bottom-Up Approach......................................................................................................................................... 30 5.2 Top-Down Approach.......................................................................................................................................... 30 5.3 UML Modeling ................................................................................................................................................... 31 5.3.1 UNIFIED MODELING LANGUAGE ........................................................................................................ 31 5.3.1.1 USER MODEL VIEW .............................................................................................................................. 31 5.3.1.2 STRUCTURAL MODEL VIEW .......................................................................................................... 31 5.3.1.3 BEHAVIORAL MODEL VIEW ............................................................................................................. 31 5.3.1.4 IMPLEMENTATION MODEL VIEW ................................................................................................ 31 4 5.3.1.5 ENVIRONMENTAL MODEL VIEW ................................................................................................... 31 5.3.2 Data Flow Diagrams ....................................................................................................................................... 32 5.3.2.1 ADMIN .......................................................................................................................................................... 32 5.3.2.2 USER.............................................................................................................................................................