Identification of Spoofed E-mail

Abstract

Email spoofing is referred to as malicious activity in which the origin details have been altered so as to make it to appear to origin from a different source. Sending fake emails is usually used to convince the receiver so that he stays unaware of the real sender. Email spoofing may be effectively used to launch phishing attacks on the receivers. The attacker may also use the attack with some amplification and in addition use mass mailer to spam mail users. Infections may be propagated by the means of spoofed emails to attack victims. There are a variety of attackers who do email spoofing. The list starts from people trying to just have fun by sending spoofed messages to users. Other serious attacks are done by wrong doers to make damages to the systems.

Authors and Affiliations

Hiral Vegda, Chirag Darji

Keywords

Related Articles

Supply Networks: An Overview

This study intends to offer a planned overview of source systems for academics and management interested in the subject. It does not try to provide a complete overview of the vast and rapidly expanding review , but it do...

Solar Charger Design for Electric Vehicles

As countries and car makers focus on goals like "going green," combating climate change, and so on, the present worldwide trend toward electric vehicles is expanding. The design of electric vehicles is an important aspec...

Study the Surface of Chitosan Which Produces an Electric Potential

The research aims to study the surface of chitosan/CNDs which produces an electric potential applied to electrical energy. 20 samples were taken to examine the results regarding energy potential and its application to el...

An Analysis of Fuel Cell Systems for Maritime Applications

Limits on contamination emanations are being fixed, constraining boat proprietors to decrease their activities' ecological effect. Energy components might be a suitable arrangement since they are eco-friendly and dischar...

Artificial Intelligence Verification Platform using Block Chain with Distributed Ledger Technology

Developments in (AI) or (DLT) are now provoking lively debate in practice and academia. AI uses data to achieve goals that were previously believed to be only possible for humans. In an unsettled context, distributed led...

Download PDF file
  • EP ID EP749399
  • DOI -
  • Views 47
  • Downloads 0

How To Cite

Hiral Vegda, Chirag Darji (2014). Identification of Spoofed E-mail. International Journal of Innovative Research in Computer Science and Technology, 2(3), -. https://www.europub.co.uk/articles/-A-749399