This paper is published in Volume-4, Issue-4, 2018
Area
Software Systems
Author
S. Ranjitha, A. Venugopal, M. Rajini Sri, A. Shobika
Org/Univ
Sri Krishna College of Arts and Science, Coimbatore, Tamil Nadu, India
Keywords
Information gathering, Attack, SMTP security
Citations
IEEE
S. Ranjitha, A. Venugopal, M. Rajini Sri, A. Shobika. SMTP attacks and detection using data mining (Information gathering), International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
S. Ranjitha, A. Venugopal, M. Rajini Sri, A. Shobika (2018). SMTP attacks and detection using data mining (Information gathering). International Journal of Advance Research, Ideas and Innovations in Technology, 4(4) www.IJARIIT.com.
MLA
S. Ranjitha, A. Venugopal, M. Rajini Sri, A. Shobika. "SMTP attacks and detection using data mining (Information gathering)." International Journal of Advance Research, Ideas and Innovations in Technology 4.4 (2018). www.IJARIIT.com.
S. Ranjitha, A. Venugopal, M. Rajini Sri, A. Shobika. SMTP attacks and detection using data mining (Information gathering), International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
S. Ranjitha, A. Venugopal, M. Rajini Sri, A. Shobika (2018). SMTP attacks and detection using data mining (Information gathering). International Journal of Advance Research, Ideas and Innovations in Technology, 4(4) www.IJARIIT.com.
MLA
S. Ranjitha, A. Venugopal, M. Rajini Sri, A. Shobika. "SMTP attacks and detection using data mining (Information gathering)." International Journal of Advance Research, Ideas and Innovations in Technology 4.4 (2018). www.IJARIIT.com.
Abstract
The SMTP protocol is used to send and receive of e-mail messages and control headers the whole body of messages that are opposed to other protocols after the message is delivered a detailed record of the e-mail transactions in the receiver mailbox. SMTP headers can be used to map the networks and the information on the messaging software gateways.