Identification of Spoofed E-mail

Abstract

Email spoofing is referred to as malicious activity in which the origin details have been altered so as to make it to appear to origin from a different source. Sending fake emails is usually used to convince the receiver so that he stays unaware of the real sender. Email spoofing may be effectively used to launch phishing attacks on the receivers. The attacker may also use the attack with some amplification and in addition use mass mailer to spam mail users. Infections may be propagated by the means of spoofed emails to attack victims. There are a variety of attackers who do email spoofing. The list starts from people trying to just have fun by sending spoofed messages to users. Other serious attacks are done by wrong doers to make damages to the systems.

Authors and Affiliations

Hiral Vegda, Chirag Darji

Keywords

Related Articles

An Overview of Wireless Networks Towards Internet

With advances in wireless technology and digital electronics, several small gadgets have begun to be utilized in a variety of everyday situations. The concept of IoT enables rapid access to environmental data. Efficiency...

Automatic Chocolate Vending Machine By Using Arduino Uno

This paper proposes the design of Automatic vending machine. The main objective of our project is to launch new technology application in society. This is Arduino based vending machine that sales different type of chocol...

Using AI for Dynamic Resource Allocation and Performance Optimization in Software Systems

This research work aims at evaluating the possibilities of using artificial intelligence in dynamic resource management and optimization of software system performance. In today’s complex world of application usage, norm...

Review of the Literature on Smart Grid Cybersecurity

The existing power generation grid with in United States seems to be an antiquated architecture, and the Home Automation is an overhaul that will contain a new features to fit customers' evolving power demands. Updating...

A Review Paper on Cuckoo Search Algorithm (CSA)

CS was first proposed by Xin-She Yang and Suash Deb in 2009, and it has received a lot of interest because of its potential efficiency in handling a variety of optimisation issues and contributes substantial. Because of...

Download PDF file
  • EP ID EP749399
  • DOI -
  • Views 42
  • Downloads 0

How To Cite

Hiral Vegda, Chirag Darji (2014). Identification of Spoofed E-mail. International Journal of Innovative Research in Computer Science and Technology, 2(3), -. https://europub.co.uk/articles/-A-749399