Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.11 Issue.3

Submission
Last date
28-Jun-2025
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-11,Issue-3. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  Email Spoofing Detection
PaperId: :  19162
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 9 Issue 1 2023
DUI:    16.0415/IJARIIE-19162
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
SHRUTI GHOSHDayananda Sagar Academy of Technology and Management (DSATM)
SPOORTHI R PRAKASHDayananda Sagar Academy of Technology and Management (DSATM)
VARSHA BHARADWAJDayananda Sagar Academy of Technology and Management (DSATM)
YASHASVI PRATAPDayananda Sagar Academy of Technology and Management (DSATM)
DR. POOJA NAYAK SDayananda Sagar Academy of Technology and Management (DSATM)

Abstract

Computer Science & Engineering
spoofing, phishing, spamming, domain forgery, malware, cyber attack, fraudulent
Emails are widely regarded as an essential form of communication in the present age of modernization, serving both personal and professional needs. Information about payments , financial statements, authentication information and card payment reports are just a few examples of the sensitive and personal information that is frequently routed over email. Emails are valuable to hackers. As a matter of fact, information in emails can be utilized for evil. Cyber attackers are always looking for innovative methods to abuse people for their own benefit. It is vital to remain attentive while receiving an email, whether from an anonymous source, someone close to you, or an organisation you are familiar with. Spam email is an unwanted email that is typically distributed in bulk to a large number of recipients. Email Spoofing is a way of impersonation, in which the scammer sends spam emails using a forged email address. The goal of email spoofing is deceiving users into believing that the email is from someone they know or can trust, for example: a colleague, vendor or brand. Exploiting that trust, the spammer asks the recipient to disclose personal information or take some other action. Spoofers use this method of deception because they know a person is more likely to engage with the content of the email if they are familiar with the sender. Spoofing is commonly used by cyber criminals as an aspect of a phishing attempt. Phishing is a method of acquiring data by impersonating an email id and sending an email that appears to be from a reputable source that may fairly request such information. The idea is to trick victims into selecting a link or downloading a file that will install malware on their device. Spoofing is also linked to domain forgery, which involves using an email id that is identical to another email id. Cyber-attacks have risen significantly in the past couple of years. Spoofed emails have caused significant financial and security breaches. This paper's primary goal is to design and examine several machine-learning algorithms and techniques for spotting fraudulent and spoofed emails.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE SHRUTI GHOSH, SPOORTHI R PRAKASH, VARSHA BHARADWAJ, YASHASVI PRATAP, and DR. POOJA NAYAK S. "Email Spoofing Detection" International Journal Of Advance Research And Innovative Ideas In Education Volume 9 Issue 1 2023 Page 1217-1224
MLA SHRUTI GHOSH, SPOORTHI R PRAKASH, VARSHA BHARADWAJ, YASHASVI PRATAP, and DR. POOJA NAYAK S. "Email Spoofing Detection." International Journal Of Advance Research And Innovative Ideas In Education 9.1(2023) : 1217-1224.
APA SHRUTI GHOSH, SPOORTHI R PRAKASH, VARSHA BHARADWAJ, YASHASVI PRATAP, & DR. POOJA NAYAK S. (2023). Email Spoofing Detection. International Journal Of Advance Research And Innovative Ideas In Education, 9(1), 1217-1224.
Chicago SHRUTI GHOSH, SPOORTHI R PRAKASH, VARSHA BHARADWAJ, YASHASVI PRATAP, and DR. POOJA NAYAK S. "Email Spoofing Detection." International Journal Of Advance Research And Innovative Ideas In Education 9, no. 1 (2023) : 1217-1224.
Oxford SHRUTI GHOSH, SPOORTHI R PRAKASH, VARSHA BHARADWAJ, YASHASVI PRATAP, and DR. POOJA NAYAK S. 'Email Spoofing Detection', International Journal Of Advance Research And Innovative Ideas In Education, vol. 9, no. 1, 2023, p. 1217-1224. Available from IJARIIE, https://ijariie.com/AdminUploadPdf/Email_Spoofing_Detection_ijariie19162.pdf (Accessed : ).
Harvard SHRUTI GHOSH, SPOORTHI R PRAKASH, VARSHA BHARADWAJ, YASHASVI PRATAP, and DR. POOJA NAYAK S. (2023) 'Email Spoofing Detection', International Journal Of Advance Research And Innovative Ideas In Education, 9(1), pp. 1217-1224IJARIIE [Online]. Available at: https://ijariie.com/AdminUploadPdf/Email_Spoofing_Detection_ijariie19162.pdf (Accessed : )
IEEE SHRUTI GHOSH, SPOORTHI R PRAKASH, VARSHA BHARADWAJ, YASHASVI PRATAP, and DR. POOJA NAYAK S, "Email Spoofing Detection," International Journal Of Advance Research And Innovative Ideas In Education, vol. 9, no. 1, pp. 1217-1224, Jan-Feb 2023. [Online]. Available: https://ijariie.com/AdminUploadPdf/Email_Spoofing_Detection_ijariie19162.pdf [Accessed : ].
Turabian SHRUTI GHOSH, SPOORTHI R PRAKASH, VARSHA BHARADWAJ, YASHASVI PRATAP, and DR. POOJA NAYAK S. "Email Spoofing Detection." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 9 number 1 ().
Vancouver SHRUTI GHOSH, SPOORTHI R PRAKASH, VARSHA BHARADWAJ, YASHASVI PRATAP, and DR. POOJA NAYAK S. Email Spoofing Detection. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2023 [Cited : ]; 9(1) : 1217-1224. Available from: https://ijariie.com/AdminUploadPdf/Email_Spoofing_Detection_ijariie19162.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads



Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
Edge-to-Cloud Synergy: An Autoencoder-GAN Framework for Anomaly Detection in Healthcare Records, Financial Statements, and Secure Cloud StorageInformation TechnologyKarthik Kushala Download
E-Commerce Fraud Detection Based on Machine Learning TechniquesComputer Science EngneeringVikram Ankush Ade Download
Detection of Phishing Website Using Gradient Boosting AlgorithmComputer Science and EngineeringYAWALKAR PRASAD PRAMOD Download
Property Dealing WebComputer Science EngineeringYash Chaudhari Download
Reinforcement Learning for the Evolution of Antimicrobial Nano formulationsmachine learningMadhusudan Download
SecuraVault: A secured blockchain based cloud storage systemComputer Engineering Anshika Jaiswal Download
Autoimmune Disease Detection in women Using Machine Learning Approachcomputer science EngineeringJ. L. V. S. Download
Medicine Overdose Detection System Using Machine LearningComputer Science EngineeringDr.Somashekhar B M Download
Home Price Prediction Using Machine LearningComputer Science & Engineering G Tushar Download
Heat diseases prediction using machine learningComputer EngineeringProf. Meghashree M B Download
GRIDSHIELD AIComputer EngineeringDr. Archana B Download
Diabetic Retinopathy Detection with AI InsightsComputer EngineeringJay Mahesh Gurav Download
Personalized Fitness Segmentation with Actionable InsightsMachine LearningAnju Tiwari Download
Sentiment-Based Machine Learning Approach for Mapping Citizen ProblemsComputer science and EngineeringDr. Madhu B K Download
Deligro: A Dual-Purpose Web Platform for Food Ordering and Leftover Food Donation ManagementComputer Science EngineeringRakesh Reddy K Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2025. IJARIIE. All Rights Reserved.