Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India

Research Article

Malicious Email Tracking System for Prevention of Malicious Code Delivered via Email

Download356 downloads
  • @INPROCEEDINGS{10.4108/eai.7-6-2021.2308869,
        author={A.Stephen  AntoJegan and Dr. K. P. Kaliyamurthie and Dr.M.  Sriram},
        title={Malicious Email Tracking System for Prevention of Malicious Code Delivered via Email},
        proceedings={Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India},
        publisher={EAI},
        proceedings_a={I3CAC},
        year={2021},
        month={6},
        keywords={malicious email tracking system met malicious code email},
        doi={10.4108/eai.7-6-2021.2308869}
    }
    
  • A.Stephen AntoJegan
    Dr. K. P. Kaliyamurthie
    Dr.M. Sriram
    Year: 2021
    Malicious Email Tracking System for Prevention of Malicious Code Delivered via Email
    I3CAC
    EAI
    DOI: 10.4108/eai.7-6-2021.2308869
A.Stephen AntoJegan1,*, Dr. K. P. Kaliyamurthie2, Dr.M. Sriram3
  • 1: Research Scholar, Department of CSE, Bharath Institute of Higher Education and Research, Chennai
  • 2: Professor, Department of CSE, Bharath Institute of Higher Education and Research, Chennai
  • 3: Associate Professor, CSE, Bharath Institute of Higher Education and Research, Chennai, India
*Contact email: stephen_jegan@yahoo.co.in

Abstract

Despite the use of state of the artwork strategies to shield touching malicious packages, they maintain to threaten and damage pc structures around the arena. In this articles we existent MET, the Malicious Email Tracking device, designed to mechanically file records on the movement conduct of malicious software distributed through e-mail attachment together at a global and local degree. MET can assist decreasethe unfold of malicious software global, specially self-replicating viruses. Small quantity of site visitors (as an example, .1%) of a completely massive e-mail circulation is sufficient to come across suspicious. Consequently, moderately few MET connections would be vital to acquire enough information so that you can offer vast protection services.