Book Details

Mails Management using SMTP Mail Server System

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

The project entitled as “Mails Management Using SMTP Mail Server System” has been planned to create in Visual studio.Net as front end and SQL Server as backend. The project aims to develop an Email Server with some salient features such as Access restriction, multi-level user accessing, and email transaction monitoring and additionally identifying the intrusion in the email server. Nowadays, more and more information systems are connected to the Internet and offer Web interfaces to the general public or to a restricted set of users. Such openness makes them likely targets for intruders, and conventional protection techniques have been shown insufficient to prevent all intrusions in such open systems. This paper proposes a generic architecture to implement intrusion-tolerant on email servers. The proposed system having all mail facilities such as send, compose and inbox options. The admin can restrict the right from those features. The admin can monitor all the mailing transactions of every user of the organization. The sender details, receiver details, data, time and date will be stored and can be verified by the administrator. The user will get the intrusion data to their mail. The intrusion data will include the intruder system IP, name and date time along with the tried passwords. This helps to identify the hacker effectively.

References

[1] OpenStack Installation Guide for Ubuntu 14.04. (n.d.). Retrieved November 20, 2016, from http://www.docs.openstack .org/juno/install-guide/install/apt/content/
[2] Adam. (2013, September 8). Creating a Mail Server on Ubuntu. Retrieved from http://www.pixelinx.com/
[3] Email Sending Limit and Send Rate – Gmail, Hotmail, Yahoo! Mail, AOL. (n.d.). Retrieved November 20, 2016, from http:// www.yetesoft.com/free-email-marketing-resources/email- sending-limit/
[4] Operator Training Guide. (n.d.). Retrieved November 20, 2016, from http://docs.openstack.org/ icehouse/training-guides/con tent/bk_operator-training-guide.html
[5] I. Forster, J. Larshon, M. Masrich, A. Snoerean, S. M. Savage, and K. Levchenkro. Security by many other names: On the effectiveness of the provider based email security. In 22nd ACM Conference on the Computer and Communications Security, Oct. 2015.
[6] Klenshin, (2001) ‘Simple Mail Transfer Protocol on Internet’ IETF RFC 2821.

Keywords

Access Restriction, E-Mail Server, intruder system IP, Hackers

Image
  • Format Volume 10, Issue 2, No 3, 2022
  • Copyright All Rights Reserved ©2022
  • Year of Publication 2022
  • Author Suryakumar L, Dr. T. Velumani
  • Reference IJCS-431
  • Page No 2878-2880

Copyright 2024 SK Research Group of Companies. All Rights Reserved.