Detecting Forged E-Mail using Data Mining Techniques
Prasanta Kumar Sahoo1, Cheguri Rajitha2

1Dr. Prasanta Kumar Sahoo*, Professor, Department of Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, Telangana, India.
2Cheguri Rajitha, Department of Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, Telangana, India.
Manuscript received on September 13, 2019. | Revised Manuscript received on October 20, 2019. | Manuscript published on October 30, 2019. | PP: 4017-4023 | Volume-9 Issue-1, October 2019 | Retrieval Number: A1169109119/2019©BEIESP | DOI: 10.35940/ijeat.A1169.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the modern era of computers E-mails is becoming a very important mode of communication for industry, people, and organizations and for the society as a whole. Especially in corporate sectors and business organizations, E mails are widely used for business and personal communication. The feature of E-mails is that, it creates quick, reliable type of communication that’s all free and simply accessible. In spite of so many alternative means of communication such as messages, social networks like WhatsApp, Twitter, and mobile applications, the uses of E-mails continuously growing exponentially. But due to its popularity there are continuously threats and attacks are carried out over E-mails for various gain. The foremost popular attack over the web is phishing mails. Phishers utilize E-mail services quite expeditiously in spite of different detection and hindrance techniques already in situ. Most of the present day phishing attacks use E-mail as the primary carrier. Phishers conceive to fraudulently acquire sensitive information, like usernames, passwords and master card details, by masquerading as a trustworthy entity in transmission. Even though there are a lot of existing techniques offered to notice phishing attacks, every one of them have their own limitations. This research aims to identify the phishing E-mails using classification techniques with a better accuracy. The technique proposed in this research work to classify forged E-mails from the Genuine E-mails and also examines the effectiveness of detection of common user’s phishing E-mails. It provides a great help to the common man by proper detection of phishing attacks and protecting their confidential data.
Keywords: Phishing attack, Fake E-mails, Data mining, anti-phishing techniques.