Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.8 Issue.4

Submission
Last date
31-Aug-2022
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-8,Issue-4. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  Open Source Based Online Forensic Tool for Analysis of Malicious Activity over Email Traffic
PaperId: :  8466
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 4 Issue 3 2018
DUI:    16.0415/IJARIIE-8466
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
Kumar ZinzuvadiaGTU PG SCHOOL
Nareshkumar GardasGTU PG SCHOOL

Abstract

Email Forensics
Email Forensics, Email Security, Traffic Analysis, Open Source
Email is ubiquitous in the contemporary commercial environment, providing a convenient and efficient method for communication. Email brings great convenience to people, but it also had a negative impact. However, involving email-related disputes and crime problems have become increasingly prominent. With the continuous development of network technology, Email has become an important means of information transmission and management in government agencies, enterprises and individuals, however, the subsequent problems of protecting web mail security has become a concern to users. Many cases of inability to determine the authenticity result in a lack of effectiveness of the evidence. In order to determine the authenticity of email evidence, a scientific appraisal is very important. Whenever you send an email message your computer generates additional information relevant to email. This additional information forms a trail of digital artifacts that can be followed when analyzing email messages. Email Forensics is concerned with the extraction of this additional data and using it to recover other information regarding emails. In addition, email has become a potential carrier of criminal evidence. Using email to spam, spread pornography, fraud and other criminal activities have become increasingly rampant. Therefore, technical appraisal of email plays an increasingly important role for analyzing and providing evidence. At present, there exists sizable amount of support for Open Source based methods for acquiring, identifying and analyzing web-based email, despite its widespread use. There is the need to achieve a systematic process for email forensics which integrates into the normal forensic analysis workflow, and which accommodates the distinct characteristics of email evidence.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE Kumar Zinzuvadia, and Nareshkumar Gardas. "Open Source Based Online Forensic Tool for Analysis of Malicious Activity over Email Traffic" International Journal Of Advance Research And Innovative Ideas In Education Volume 4 Issue 3 2018 Page 522-529
MLA Kumar Zinzuvadia, and Nareshkumar Gardas. "Open Source Based Online Forensic Tool for Analysis of Malicious Activity over Email Traffic." International Journal Of Advance Research And Innovative Ideas In Education 4.3(2018) : 522-529.
APA Kumar Zinzuvadia, & Nareshkumar Gardas. (2018). Open Source Based Online Forensic Tool for Analysis of Malicious Activity over Email Traffic. International Journal Of Advance Research And Innovative Ideas In Education, 4(3), 522-529.
Chicago Kumar Zinzuvadia, and Nareshkumar Gardas. "Open Source Based Online Forensic Tool for Analysis of Malicious Activity over Email Traffic." International Journal Of Advance Research And Innovative Ideas In Education 4, no. 3 (2018) : 522-529.
Oxford Kumar Zinzuvadia, and Nareshkumar Gardas. 'Open Source Based Online Forensic Tool for Analysis of Malicious Activity over Email Traffic', International Journal Of Advance Research And Innovative Ideas In Education, vol. 4, no. 3, 2018, p. 522-529. Available from IJARIIE, https://ijariie.com/AdminUploadPdf/Open_Source_Based_Online_Forensic_Tool_for_Analysis_of_Malicious_Activity_over_Email_Traffic_ijariie8466.pdf (Accessed : 16 May 2018).
Harvard Kumar Zinzuvadia, and Nareshkumar Gardas. (2018) 'Open Source Based Online Forensic Tool for Analysis of Malicious Activity over Email Traffic', International Journal Of Advance Research And Innovative Ideas In Education, 4(3), pp. 522-529IJARIIE [Online]. Available at: https://ijariie.com/AdminUploadPdf/Open_Source_Based_Online_Forensic_Tool_for_Analysis_of_Malicious_Activity_over_Email_Traffic_ijariie8466.pdf (Accessed : 16 May 2018)
IEEE Kumar Zinzuvadia, and Nareshkumar Gardas, "Open Source Based Online Forensic Tool for Analysis of Malicious Activity over Email Traffic," International Journal Of Advance Research And Innovative Ideas In Education, vol. 4, no. 3, pp. 522-529, May-Jun 2018. [Online]. Available: https://ijariie.com/AdminUploadPdf/Open_Source_Based_Online_Forensic_Tool_for_Analysis_of_Malicious_Activity_over_Email_Traffic_ijariie8466.pdf [Accessed : 16 May 2018].
Turabian Kumar Zinzuvadia, and Nareshkumar Gardas. "Open Source Based Online Forensic Tool for Analysis of Malicious Activity over Email Traffic." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 4 number 3 (16 May 2018).
Vancouver Kumar Zinzuvadia, and Nareshkumar Gardas. Open Source Based Online Forensic Tool for Analysis of Malicious Activity over Email Traffic. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2018 [Cited : 16 May 2018]; 4(3) : 522-529. Available from: https://ijariie.com/AdminUploadPdf/Open_Source_Based_Online_Forensic_Tool_for_Analysis_of_Malicious_Activity_over_Email_Traffic_ijariie8466.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads


Last download on 5/16/2018 12:37:58 AM

Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
Factors Affecting the Dropout Rate Among Information Technology Students: A Basis for an Intervention PlanIT EducationRuth G. Luciano Download
IMAGE SEGMENTATION IN ROAD TRAFFIC APPLICATION USING MASK R-CNNInformation TechnologyKAMBHAMPATI SAHITHI Download
Study of measures taken by think tanks to improve efficiencyComputer ManagementRahul Shivaji Bagade Download
Study of factors affecting think tanks efficiencyComputer ManagementDr. Ramchandra Govind Pawar Download
WEB APPLICATION FOR CAMPAIGN FUNDING WITH FORGERY PREVENTION USING SHA-256 IN BLOCKCHAINInformation TechnologyIgnancya Michelle G Download
Configuration Plan of SAP-ERP Financial Accounting module for a Military Unit in the PhilippinesInformation System/Finance/Information TechnologyLaarnie Bartolome Download
Prediction of cyber attack using data science technique .Information TechnologyHarshini Priya A Download
Study and analysis of automation testingInformation technology Abhinish Pratap Singh Download
AUGMENTED VISUALIZER FOR REAL TIME DATA THROUGH VIRTUAL REALITY IN AUTOMATION AND CONTROL OVER INTERNETinformation technology engineeringAshwini.M Download
Hybrid AlgorithmInformation TechnologyAshish Download
Crop Recommendation System using Machine LearningInformation Science and engineeringRitika Rajani Download
Hybrid AlgorithmsInformation TechnologyShantnu Sharma Download
MODIFYING AND PREDICTING OF CRYPTOCURRENCY PRICES USING DATA SCIENCE TECHNIQUEInformation technology Amritha A Download
Tomato Leaf Diseases Identification using CNNINFORMATION TECHNOLOGYDhulipalla Srija Download
She Shakti: A femle Friendly AppInformation TechologyHarshita Singh Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2022. IJARIIE. All Rights Reserved.