Bsc. Thesis Template

Bsc. Thesis Template

Malicious Email Detection & Filtering System Using Bayesian Machine Learning Algorithm Authors Rao Muhammad Umer 10CS61 2010-IU-967 Tayyeb Islam 10CS76 2010-IU-972 Awais Anwar 10CS119 2010-IU-994 Hussain Ahmed Madni 10CS67 2010-IU-970 Supervisor Engr. Khurram Hameed Lecturer DEPARTMENT OF COMPUTER SYSTEM ENGINEERING UNIVERSITY COLLEGE OF ENGINEERING AND TECHNOLOGY The Islamia University of Bahawalpur 2010-2014 i Malicious Email Detection & Filtering System Using Bayesian Machine Learning Algorithm Authors Rao Muhammad Umer 10CS61 2010-IU-967 Tayyeb Islam 10CS76 2010-IU-972 Awais Anwar 10CS119 2010-IU-994 Hussain Ahmed Madni 10CS67 2010-IU-970 A thesis submitted in partial fulfillment of the requirements for the degree of B.Sc. Computer System Engineering Supervisor Engr. Khurram Hameed Lecturer (UCET-IUB) External Examiner Signature: ________________________________________ Thesis Supervisor Signature: ________________________________________ DEPARTMENT OF COMPUTER SYSTEM ENGINEERING UNIVERSITY COLLEGE OF ENGINEERING AND TECHNOLOGY The Islamia University of Bahawalpur 2010-2014 ii ABSTRACT Suspicious or Malicious E-mail detection is a kind of mailing system where suspicious users are identified by determining the keywords used by someone. The keywords such as bomb, RDX and attached harmful files are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails. Malicious E-mail is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content. 1 UNDERTAKING I certify that research work titled “Malicious Email Detection & Filtering System Using Bayesian Machine Learning Algorithm” is my own work. The work has not been presented elsewhere for assessment. Where material has been used from other sources it has been properly acknowledged/referred. Signature of Students Rao Muhammad Umer 10CS61 ……………….. 2010-IU-967 Tayyeb Islam 10CS76 …………….…………….. 2010-IU-972 Awais Anwar 10CS119 ………………………… 2010-IU-994 Hussain Ahmed Madni 10CS67 ……………………………… 2010-IU-970 2 ACKNOWLEDGEMENTS We are grateful to Allah Almighty who provided us with this wonderful concept and bestowed us the ability to complete it successfully. We are thankful to our parents for their constant support and their financial help as the project wouldn’t have been successful without their motivation and prayers. We are grateful to our supervisor Engr. Khurram Hameed who helped us out of many hitches and provided us guidance at many instances and motivated us to carry on our work which obviously resulted in successful completion of our project. And finally, we thank all the faculty members of this great institution that helped us over the course of our studies. This project wouldn’t have been made without their support. 3 Table of Contents UNdertaking ....................................................................................................................... 2 Acknowledgements ............................................................................................................. 3 List of figures...................................................................................................................... 9 Chapter 1 .......................................................................................................................... 12 1.1Statement of the Problem ................................................................................................................................... 12 1.2 Objectives............................................................................................................................................................. 13 1.3 Block Diagram .................................................................................................................................................... 14 Chapter 2 .......................................................................................................................... 15 2.1 Login Module ...................................................................................................................................................... 15 2.2Registration Module ............................................................................................................................................ 16 2.3 Administration Module...................................................................................................................................... 16 2.4 Encryption Module ............................................................................................................................................. 17 2.5 User Module ........................................................................................................................................................ 18 Chapter 3 .......................................................................................................................... 19 3.1 N-Tier Architecture ............................................................................................................................................ 19 3.1.1 2-Tier and 3-Tier Architecture ...................................................................................................................... 19 3.2 MVC Architecture .............................................................................................................................................. 21 3.2.1 Model-1 ............................................................................................................................................................. 21 3.2.2 Model-2(MVC) ................................................................................................................................................ 21 3.2.3 Advantages of MVC...................................................................................................................................... 23 Chapter 4 .......................................................................................................................... 24 4.1 Agile software Development ............................................................................................................................ 24 4.1.1 Manifesto for Agile Software Development ............................................................................................... 24 4.1.2 Comparison between Water Fall and Agile Software Process Model.................................................... 24 4.2 Scrum .................................................................................................................................................................... 25 4.2.1 User Story ......................................................................................................................................................... 26 4.3 Test Driven Development (TDD) .................................................................................................................... 28 4.3.1Software for TDD ............................................................................................................................................. 28 4.3.2 The Three Laws of TDD ................................................................................................................................ 28 Chapter 5 .......................................................................................................................... 30 5.1 Bottom-Up Approach......................................................................................................................................... 30 5.2 Top-Down Approach.......................................................................................................................................... 30 5.3 UML Modeling ................................................................................................................................................... 31 5.3.1 UNIFIED MODELING LANGUAGE ........................................................................................................ 31 5.3.1.1 USER MODEL VIEW .............................................................................................................................. 31 5.3.1.2 STRUCTURAL MODEL VIEW .......................................................................................................... 31 5.3.1.3 BEHAVIORAL MODEL VIEW ............................................................................................................. 31 5.3.1.4 IMPLEMENTATION MODEL VIEW ................................................................................................ 31 4 5.3.1.5 ENVIRONMENTAL MODEL VIEW ................................................................................................... 31 5.3.2 Data Flow Diagrams ....................................................................................................................................... 32 5.3.2.1 ADMIN .......................................................................................................................................................... 32 5.3.2.2 USER.............................................................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    116 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us