Identification of Spoofed E-mail

Abstract

Email spoofing is referred to as malicious activity in which the origin details have been altered so as to make it to appear to origin from a different source. Sending fake emails is usually used to convince the receiver so that he stays unaware of the real sender. Email spoofing may be effectively used to launch phishing attacks on the receivers. The attacker may also use the attack with some amplification and in addition use mass mailer to spam mail users. Infections may be propagated by the means of spoofed emails to attack victims. There are a variety of attackers who do email spoofing. The list starts from people trying to just have fun by sending spoofed messages to users. Other serious attacks are done by wrong doers to make damages to the systems.

Authors and Affiliations

Hiral Vegda, Chirag Darji

Keywords

Related Articles

Kidney Tumour Detection Using Deep Neural Network

Classifying the malignancy of a renal tumour is one of the most important urological duties because it plays a key role in determining whether or not to undergo kidney removal surgery (nephrectomy). Currently, the radiol...

Helmet Detection and Number Plate Recognition Using YOLOv8 and Tensorflow Algorithm in Machine Learning

In many suburbs, urban areas and locals across the globe there is a disconcerting surge in motorcycle accidents has become increasingly evident. Even though a helmet is the most important safety gadget, people do not wea...

A Review Paper on Operational Research

Any action poses ethical issues, questions about "good" and "right" ways of doing and living; or questions about beliefs and obligations to place them differently. Operational study (OR) has since its inception been inte...

Stabilization of Black Cotton Soil by Using Waste Foundry Sand and Crushed Waste Glass

Generally Black Cotton Soil exhibits undesirable engineering properties like shrinkage and swelling properties losses its strength, when come in contact with water. Thereby poor bearing capacity and higher compressibilit...

Reinforcement Learning: A Comprehensive Overview

Machine Learning is one of the most essential parts of Artificial Intelligence. Machine learning now exists as an important innovation and has a sufficient number of uses. Reinforcement Learning is one of the largest Mac...

Download PDF file
  • EP ID EP749399
  • DOI -
  • Views 46
  • Downloads 0

How To Cite

Hiral Vegda, Chirag Darji (2014). Identification of Spoofed E-mail. International Journal of Innovative Research in Computer Science and Technology, 2(3), -. https://europub.co.uk/articles/-A-749399