Sei sulla pagina 1di 70

Project report 2015

UNIVERSITY OF CALICUT

INTRODUCTION

CCSIT Thalikkulam

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

1. INTRODUCTION
1.1 PROJECT OVERVIEW

OPPA MAIL SERVERICES


Here in, I propose an email server which can protect user from phishing
attacks and unwanted mails using Phishing algorithm..Mainly Phishing is the
act of attempting to gain access to personal information such as usernames,
passwords and bank details by masquerading as a trustworthy entity. A
phisher utilises electronic communications that are falsified to purport from
popular legitimate companies to include social websites, auction sites, online
payment processors or IT administrators; all are commonly used to lure the
unsuspecting public to share their private information.
Main idea of this project is to implement a anti phishing algorithm
called as Phishing algorithm like link guard algorithm which works on
character based so it can detect known phishing attacks and also unknown
ones. Phishing is the process of hacking users security information like bank
accounts, credit card numbers etc. In this process users will receive emails
with hyperlinks with information like it is sent from banks and when user
clicks on links users will be routed to a unknown website which will ask for
bank account details like password changes, credit card details. When users
enter his details hackers will capture that information at server side and use
that information for transferring money from bank accounts. In order to solve
this problem we use anti phishing algorithms to block phishing mails.

CCSIT Thalikkulam

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Phishing is a new word produced from 'fishing',


it refers to the act that the attacker allure users to visit a faked Web
site by sending them faked e-mails (or instant messages), and stealthily
get victim's personal information such as user name, password, and national
security ID, etc. This information then can be used for future target
advertisements or even identity theft attacks (e.g., transfer money from
victims' bank account). The frequently used attack method is to send e-mails
to potential victims, which seemed to be sent by banks, online organizations,
or ISPs. In these e-mails, they will make up some causes. So here we mainly
give attention for url, attachments and hyperlink for checking status of
phishing. Then user can create a blacklist entries to ensure security. In this
project the admin permitted to manage user and also a black and whitelist
entries for more security and confidentiality.

CCSIT Thalikkulam

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

1.2 ORGANIZATION PROFILE

The computer science and Electronics programs at Dc info Tec offers an ISO
certified project certification that prepare you for the fastest growing job
sectors and highly valued academic sales .we drive you to new innovations
and opportunities in your specified technical milestones ,where finally every
aspect of your life .The primary objective of the course is to provide students
with instructions and practical experience in advanced methods and
techniques of the selected project framework .The Experience is gained in the
context of a short long term research project designed to produce specimens
applications which will support further lab analysis and eventual publication
of project result in hard copy and soft copy as well .computing your projects
utilizing hi-tech components ,skilled guides ,reference documents, online
study material and of course for a less fee structured around you campus
itself.

CCSIT Thalikkulam

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

SYSTEM ANALYSIS

CCSIT Thalikkulam

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

2. SYSTEM ANALYSIS
2.1. EXISTING SYSTEM AND DRAWBACKS

1) Detect and block the phishing Web sites in time: If we can detect the
phishing Web sites in time, we then can block the sites and prevent phishing
attacks. It's relatively easy to (manually) determine whether a site is a
phishing site or not, but it's difficult to find those phishing sites out in time.
Here we list two methods for phishing site detection.
A) The Web master of a legal Web site periodically scans the root DNS for
suspicious

sites

(e.g.www.1cbc.com.cnvs.www.icbc.com.cn).

B) Since the phisher must duplicate the content of the target site, he must
use tools to (automatically) download the Web pages from the target site.
It is therefore possible to detect this kind of download at the Web server and
trace back to the phisher. Both approaches have shortcomings. For DNS
scanning, it increases the overhead of the DNS systems and may cause
problem for normal DNS queries, and furthermore, many phishing attacks
simply do not require a DNS name. For phishing download detection, clever
phishers may easily write tools which can mimic the behavior of human
beings to defeat the detection.
2) Enhance the security of the web sites: The business Websites such as the
Web sites of banks can take new methods to guarantee the security of users'
personal information. One method to enhance the security is to use hardware
devices. For example, the Barclays bank provides a hand-held card reader to
the users. Before shopping in the net, users need to insert their credit card

CCSIT Thalikkulam

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

into the card reader, and input their (personal identification number) PIN
code, then the card reader will produce a onetime security password, users
can perform transactions only after the right password is input. Another
method is to use the biometrics characteristic (e.g. voice, fingerprint, iris,
etc.) for user authentication. For example, PayPal had tried to replace the
single password verification by voice recognition to enhance the security of
the Web site.
3) Block the phishing e-mails by various spam filters: Phishers generally
use e-mails as 'bait' to allure potential victims. SMTP (Simple Mail Transfer
Protocol) is the protocol to deliver e-mails in the Internet. It is a very simple
protocol which lacks necessary authentication mechanisms. Information
related to sender, such as the name and email address of the sender, route of
the message, etc., can be counterfeited in SMTP. Thus, the attackers can send
out large amounts of spoofed e-mails which are seemed from legitimate
organizations. The phishers hide their identities when sending the spoofed emails, therefore, if anti-spam systems can determine whether an e-mail is sent
by the announced sender (Am I Whom I Say I Am?), the phishing attacks
will be decreased dramatically.
4) Install online anti-phishing software in users computers: Despite all
the above efforts, it is still possible for the users to visit the spoofed Web
sites. As a last defense, users can install anti-phishing tools in their
computers.
The Anti-phishing tools in use today can be divided into two categories:
Blacklist/white list based
Rule-based
CCSIT Thalikkulam

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Category I: When a user visits a Web site, the anti-phishing tool searches the
address of that site in a blacklist stored in the database. If the visited site is on
the list, the anti-phishing tool then warns the users. Tools in this category
include Scam Blocker from the EarthLink Company, Phish Guard, and Net
craft, etc. Though the developers of these tools all announced that they can
update the blacklist in time, they cannot prevent the attacks from the newly
emerged (unknown) phishing sites.
Category II: this category of tools uses certain rules in their software, and
checks the security of a Web site according to these rules. Examples of this
type of tools include Spoof Guard developed by Stanford, Trust Watch of the
Geo Trust, etc. Spoof Guard checks the domain name, URL (includes the port
number) of Web site, it also checks whether the browser is directed to the
current URL via the links in the contents of e-mails. If it finds that the
domain name of the visited Web site is similar to a well-known domain
name, or if they are not using the standard port, Spoof Guard will warn the
users. In Trust Watch, the security of a Web site is determined by whether it
has been reviewed by an independent trusted third party organization. Both
Spoof Guard and Trust Watch provide a toolbar in the browsers to notify
their users whether the Web site is verified and trusted. It is easy to observe
that all the above defense methods are useful and complementary to each
other,

But

none

CCSIT Thalikkulam

of

them

are

perfect

at

the

current

stage.

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

2.2. PROPOSED SYSTEM AND FEATURES

I) Classification of the hyperlinks in the phishing e-mails


In order to (illegally) collect useful information from potential
victims, phishers generally tries to convince the users to click the
hyperlink embedded in the phishing e-mail. A hyperlink has a structure as
follows.
<a href="URI "> Anchor text <\a>
where URI' (universal resource identifiers) provides the necessary
information needed for the user to access the networked resource and
'Anchor text' is the text that will be displayed in user's Web browser.
Examples of URIs are:

http://www.google.com

https://www.icbc.com.cn/login.html

ftp://61.112.1.90:2345.
'Anchor text' in general is used to display information related to the

URI to help the user to better understand the resources provided by the
hyperlink. In the following hyperlink, the URI links to the phishing archives
and its anchor text "Phishing Archive" informs the user what's the hyperlink
is

about.

<a

href

http://www.antiphishing.org/phishing-

archive.html">Phishing Archive </a>

CCSIT Thalikkulam

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

PROJECT MODULES:
Phishing can generally occur with Banking websites or
e-shopping websites. This project explains the implementation of the
oppaPhishing algorithm using a mail-box system.
There are three modules involved in this project:

Admin Module (I)


User list management
Black & Whitelist Management
Feedback reply and Notification send

User Module (II)


Creation of a mail system and database operations
Compose,Send and Receive a mail
Blacklist management
Chatting

Implementation of the oppa Phishing algorithm Module (III)


Implementation of oppaphishing algorithm for secure the user from
phishing mails or phishing attacks.for this mainly use checking of
hyperlinks and black/white list from user and admin. And also checks if
the to address is valid or not.

CCSIT Thalikkulam

10

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

MODULE I
User list management
Admin module is the admin interface to manage the user details.
That is admin can view the details of registered users and can
delete if any unauthorized user is registered.
Black and white list management
Admin have the ability to made entries to black or white lists. That
is the site frequently report for phishing is added to blacklist and
authorized and good site added to white list. When a site is in white
list then user cannot add them to blacklist.The mails from blacklist
considered as phishing.
Feedback reply and Notification send
Admin can view the feedback and reply for them.If any
notifications send by admin can view in the inbox of user.

MODULE II
Creation of a mail system and database operations
This module deals with the user interface for the home page, sign-in,
sign-up and forgot your password pages. This module enables a new
user to Sing-Up. It also enables an existing user to Sign-In. The user
may use the Forget password link if he did forget his password. The
password is retrieved on the basis of security question and answer
given by the user. Database operation manages the users. Every time a
new user signs in his details are written in to the database.

CCSIT Thalikkulam

11

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Compose, Send and Receive a mail


The module enables the user to compose and send a mail. It also
allows the user to read a received mail. Once a mail is sent the date and
the subject of the mail gets displayed. The received mail can be checked
if it is phishing or not, the implementation of which is given in the next
module.
Blacklist management
User can add the doubted phishing url into blacklist. Then the mails
from this site is added to phishbox mails .If any wanted mails in the
phishbox user can restore it to inbox properly.
Chatting
One user can chat with another instantly. Both users can view the
messages at the same time.And also can clear the history of messaging or
chatting.
MODULE III
Implementation of the oppa Phishing algorithm module deals with the
checking of possibility of phishing mails. This algorithm mainly check for
the blacklist of corresponding user and admin. when a site in the whitelist of
admin then user cannot add the same site in the blacklist of himself. The
mails from the blacklist of respective user and admin is added to phishbox
mails.
Then checking of extension of attachments is checked.When a mail
contain pdf files,doc file and .exe files then the possibility of the mail
become a phishing mail is increased. So it is added in to phishbox. Existing

CCSIT Thalikkulam

12

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

of links increase the chance of the mail become a phishing mail. And most
of the phishing mail had the hyperlink as numerals. These checking ensure
that the mail is phishing or not. But the user frequently check the inbox as
well as the phishbox. If any wanted files in phishbox user can restore it into
inbox.
The next checkingis to check if the to address is valid or not.because the
phisher use the technique of spoof id that is actual address and the address
shown is not same. So find the phisher by checking the address is same as in
the registration.then the mail is send to the phishbox.
user can add url and domain name and categorize them black list
under settings. Admin also can manage blacklist and whitelist.This is the
main backborn of the oppa phishing algorithm. And some common features
of phishing mails also be checked for categorises the mails as Phishing or
Non-phishing.

CCSIT Thalikkulam

13

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

2.3 FEASIBILITY STUDY

A feasibility study is an evaluation and analysis of the potential of the


proposed project which is based on extensive investigation and research to
give full comfort to the decisions makers. Feasibility studies aim to
objectively and rationally uncover the strengths and weaknesses of an
existing business or proposed venture, opportunities and threats as presented
by the environment the resources required to carry through, and ultimately
the prospects for success. In its simplest terms, the two criteria to judge
feasibility are cost required and value to be attained. As such, a well-designed
feasibility study should provide a historical background of the business or
project, description of the product or service, accounting statements, details
of the operations and management, marketing research and policies, financial
data, legal requirements and tax obligations. Generally, feasibility studies
precede technical development and project implementation. The key
consideration are;
Economic feasibility
Technical feasibility
Behavioral feasibility

Economical Feasibility
Economic Feasibility concerns return from the investments in a project. It
determines whether it is worthwhile to do with in it. I have come to know that
creating this system will make the cost acceptable.

CCSIT Thalikkulam

14

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

In cost-benefit analysis, various benefits and costs involved are considered,


calculated and compared. If the benefits are more than cost, the project is
considered economically feasible. My project developing has less cost.
Economic feasibility is the most important and frequently used method for
evaluating the effectiveness of the proposed system .It is very essential
because the main goal of the proposed system is to have economically better
result along with increased efficiency of the cost versus the benefit and
savings are expected from the proposed system.

Technical feasibility
The assessments of technical feasibility centers on the existing system and to
what extent it can support the proposed addition. This was based on an
outline design of system requirements. It involves financial considerations to
accommodate technical enhancement. This can be quantified in terms of
volumes of data, trends, frequency of updating, etc. in order to estimate
whether the new system will perform adequately or not. Technological
feasibility is carried out to determine whether the company has the capability,
in terms of software, hardware, personnel and expertise, to handle the
completion of the project.
Behavioral Feasibility
An estimate should be made of how strong a reaction the user staff is likely to
have towards the development of a computerized system.
It is common knowledge that computer installation have something to do
with Turnover, Transfers and changes in employee Job Status.

CCSIT Thalikkulam

15

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Operational feasibility
Operational feasibility is a measure of how well a proposed system solves the
problems, and takes advantage of the opportunities identified during scope
definition and how it satisfies the requirements identified in the requirements
analysis phase of system development. In the operational feasibility study it
is found that the development of proposed system is operationally feasible.
Security feasibility
The security of the database from being tampered from an unauthorized
personnel different password fields were provided to different users. The
password are validated and given in the front-end keeping its flexibility and
user friendliness in view. it is very important that user should maintain their
own individuality and identity so as one cannot overlap or interfere or even
tamper the restricted fields. This application is made secure using proper
authentication mechanisms

CCSIT Thalikkulam

16

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

SYSTEM REQUIREMENTS

CCSIT Thalikkulam

17

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

3. SYSTEM REQUIREMENTS
3.1 HARDWARE REQUIREMENTS
Processor

: Intel core 2 due

Processor Speed

: 1.0GHZ

RAM

: 1GB

Hard Disk

: 80GB

Key Board

: 104keys

Monitor

: 15 VGA Digital Color Monitor

Mouse

: Scroll Mouse

3.2 SOFTWARE REQUIREMENTS

OS

: Windows XP with SP2 or Windows 7

Front-End

: PHP, HTML, JAVA SCRIPT, My SQL.

Back-End

: SQLSERVER

Programming language

: PHP

CCSIT Thalikkulam

18

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

SYSTEM DESIGN

CCSIT Thalikkulam

19

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

4. SYSTEM DESIGN
Conceptual system design is the process or art of defining the architecture,
components, modules, interfaces, and data for a system to satisfy specified
requirements. One could see it as the application of systems theory to
produce development. There is some overlap with the disciplines of
systems analysis, system architecture and systems engineering.

4.1. DATA FLOW DIAGRAM


The database may be defined as an organized collection of related
information. The organized information serves as a base from which further
recognizing can be retrieved desired information or processing the data. The
most important aspect of building an application system is the design of tables.
The data flow diagram is used for classifying system requirements to
major transformation that will become programs in system design. This is
starting point of the design phase that functionally decomposes the required
specifications down to the lower level of details. It consists of a series of
bubbles joined together by lines.
Bubbles: Represent the data transformations.
Lines: Represents the logic flow of data.
Data can trigger events and can be processed to useful information. System
analysis recognizes the central goal of data in organizations. This dataflow
analysis tells a great deal about organization objectives are accomplished.
Dataflow analysis studies the use of data in each activity. It documents
this finding in DFDs. Dataflow analysis give the activities of a system from the

CCSIT Thalikkulam

20

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

viewpoint of data where it originates how they are used or hanged or where
they go, including the stops along the way from their destination. The
components of dataflow strategy span both requirements determination and
systems design. The first part is called dataflow analysis.
As the name suggests, we didnt use the dataflow analysis tools
exclusively for the analysis stage but also in the designing phase with
documentation.
Notations used in Dataflow Diagrams
The logic dataflow diagrams can be drawn using only four simple
notations i.e., special symbols or icons and the annotation that associates them
with a specific system. Since the choice of notation we follow, does not affect
impede or catalyze the system process; we used three symbols from
YOURDON notation and one from Gain and Sarson notation as specified
below.
Element References

Symbols

Data Flow

Process

Data Store

Source or Sink

CCSIT Thalikkulam

21

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Process

: describes how input data is converted to output Data

Data Store : Describes the repositories of data in a system


Data Flow : Describes the data flowing between process, Data stores and
external entities.
Sources

: An external entity causing the origin of data.

Sink

: An external entity, which consumes the data.

Context Diagram:
The top-level diagram is often called a context diagram. It contains
a single process, but it plays a very important role in studying the current
system. The context diagram defines the system that will be studied in the
sense that it determines the boundaries. Anything that is not inside the process
identified in the context diagram will not be part of the system study.

It

represents the entire software element as a single bubble with input and output
data indicated by incoming and outgoing arrows respectively.

Types of Dataflow Diagrams


DFDs are two types:
Physical DFD
Logical DFD

CCSIT Thalikkulam

22

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

1. Physical DFD
Structured analysis states that the current system should be first
understand correctly. The physical DFD is the model of the current system and
is used to ensure that the current system has been clearly understood. Physical
DFDs shows actual devices, departments, people etc., involved in the current
system
2. Logical DFD
Logical DFDs are the model of the proposed system. They clearly should
show the requirements on which the new system should be built. Later during
design activity this is taken as the basis for drawing the systems structure
charts

CCSIT Thalikkulam

23

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Level 0
request

request
OPPA
MAIL
SERVICE

ADMIN
response

Level 1 for admin

USER
response

Adminname ,pswd
admin
Id
Request to change pswd

Change
pswd

Request to
manage user
Manage

user
Request to
manage
phishing
Manage
phishing

admin

login

Request to
send
notification
s

Request to
view&reply
feedback

Request to
whitelist

CCSIT Thalikkulam

24

Send notfications

Reply
feedbac
k

Whitelis
t entry

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Level 1 for user

CCSIT Thalikkulam

25

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Level2 for admin

Current pswd
Chang
e
pswd

admin
new pswd

User details

Mana
-ge
user

Manag
e
phishin
g

ADMIN

registration
response

Applying oppaphishing
algm

phishing
response

LOGIN
Send
notifIcations

notifications

inbox

Reply
feedback
Reply
feedback

feedback

feedback

Whitelist view
White
list
entry

CCSIT Thalikkulam

26

whitebox
Whitelist entry

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Level2 for user


Regis
tratio

Registration details

registration
Reg details

Mana
ge
pswd

Pswd details

Pswd
details

Deleted mails

trash

USER
4.2.

logi
n

Mail details
Comp
ose
&sen

Send
&
view

View
phish
ing

sentbox
Response
details of draft mail

draft
Response
details of phishingmails

phishbox
url details of phishing

Mana
ge
blackli

Read
receiv
ed

Delet
e
mails

Send
feedback

phishing
Response

Mail details
inbox
Details of deleted
Details of deleted

trash
Response

Feedback details

feedback

Conversation userid
conversation

Chati
Cha-ng
ting
Messages send
saved

CCSIT Thalikkulam

27

Conversatio
n-rply

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

4.2 USECASE DIAGRAM

User Management

Blacklist Management
Reply feedback
Notification send

Compose,Send &Receive
mails
Phishing mail alerts

Draft mails & resend mails

View junk mails &Restore


ADMIN

USER
Chating with other users

Send Feedback
Profile editing features

CCSIT Thalikkulam

28

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

4.3 ER DIAGRAM
e
nt

url

Aid

Userid

man
ages

usernam
e
usernam
e

aname
ema
whitebox

admin

useri
fid

name
Ca
n
se

mnt

Ca
n
vie

Sec_ques

year

apswd
wid

registration

birthda
y
day

pswd

userid

Ca
n
vie

Sec_ans

eid

fusernam
subject

inbox
feedbck
faddress
commen
Del
ete
d

an
aly
zes

faddre
ss

tid
conde
nt

url

date
pid

res
ulti
ng

did

ad
d
to

conten
phishbox

faddres

cid

userid

D
el

taddres
s

hyperli

Date

contacts

phishing

ppi
d

ad
d
to

trash

ddat

dnam
e

chatdat
ee
rdate

content

ad
d
to
si

sentbox
date
userna

draft
useri

taddress

userid

conten
t
taddress

conten

userid

CCSIT Thalikkulam

29

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

4.4. Input Design


The input design is very important for any application. The input design
describes how the software communicates within itself, to the system that is
interested with it and with humans who use it. The input design is the process of
converting the user-oriented inputs into the computer-based format. The data is
fed into the system using simple interactive forms. The forms have been
supplied with message so that user can enter the data without facing any
difficulty. The data is validated wherever it requires in the project.

4.5. Output Design


Computer output is the most important and the direct information source
to the user. Output design is a process that involves designing necessary outputs
in the form of reports that should be given to the users according to the
requirements.Efficient, intelligible output design should improve the systems
relationship with the user and help in decision making. Since the reports are
directly referred by the management for taking decisions and to draw
conclusions they must be designed with almost care and the details in the
reports must be simple, descriptive and clear to the user. So while designing
output the following things are to be considered.

CCSIT Thalikkulam

30

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

4.6 Database Design


In designing a database application you must set up not only the
programs routines for maximum performance, but you must pay attention also
to the physical layout of the data storage. A good database design does the
following:
1.

Provides minimum search times when locating specific records

2.

Stores the data in the most efficient manner possible to keep the database
from growing too large.

3.

Makes data updates as easy as possible.

4.

It is flexible enough to allow inclusion of new functions required of


theprogram.
Data normalization is the process of eliminating redundant data within a

database. Taking data normalization fully results in each piece of information in


a database appearing only once, although thats always not practical.
Data normalization can be handled by creating child tables. A child table
is a table in which all the entries share common information that is stored in
another tablet table containing the common information is called the parent
table, and the table containing the members first name is child table. A look up
table is another way to store information to prevent data redundancy and to
increase the accuracy of data entry functions.
The objectives of database are accuracy and integrity, successful
recovery from failure, privacy and security of data and good overall
performance database is a collection of interrelated data stored with minimum

CCSIT Thalikkulam

31

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

redundancy to serve many users quickly and efficiently. The general objective
is to make information access easy, quick inexpensive and flexible for user.
The object covered in the database design is :
Controlled redundancy
Data independence
Accuracy and security
Performance
Tables used in this project are :
Admin
Contacts
Conversation
Conversation_reply
Draft
Feedback
Inbox
Phishbox
Phishing
Registration
Sentbox
Trash
Whitebox

CCSIT Thalikkulam

32

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

TABLE1: ADMIN
SL NO.

FIELD

TYPE

CONSTRINTS

DESCRIPTION

1
2
3

Aid
Adminname
apswd

Int(10)
Varchar(40)
Varchar(20)

Primary key
Not null
Not null

Admin id
Admin name
Admin pswd

TABLE2: CONTACTS
SL NO.

FIELD

TYPE

CONSTRINTS

DESCRIPTION

1
2
3
4
5

cid
Tusername
Taddress
userid
id

Int(10)
Varchar(30)
Varchar(40)
Int(10)
Int(10)

Primary key
Not null
Not null
Not Null
Foreign key

Contact id
To username
To address
User id
Selecteduserid

TABLE3: CONVERSATION
SL NO.

FIELD

TYPE

CONSTRINTS

DESCRIPTION

1
2
3

cnid
User1
User2

Int(10)
Int(11_
Int(11)

Primary key
Not null
Not null

Chat id
First user
Second user

TABL4: CONVERSATION_REPLY
SL NO.

FIELD

TYPE

CONSTRINTS

DESCRIPTION

1
2
3
4
5

rplyid
cnid
Taddress
userid
id

Int(10)
Int(10)
Varchar(40)
Int(10)
Int(10)

Primary key
Foreign Key
Not null
Not Null
Not Null

Reply id
Chat id
To address
User id
Selecteduserid

SL NO.

FIELD

TYPE

CONSTRINTS

DESCRIPTION

1
2
3
4
5
6
7
8
9

did
userid
tusername
taddress
Date_draft
Subject
Content
Important
d_attachment

Int(10)
Int(10)
Varchar(30)
Varchar(40)
Date
Varchar(20)
Varchar(100)
boolean
blob

Primary key
Foreign Key
Not null
Not null
Not null
Null
Null
Not null
Null

Draft id
User id
to username
to address
Date of draft
Subject
Content
Important
draft attachment

TABLE5: DRAFT

CCSIT Thalikkulam

33

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

TABLE6: FEEDBACK
SL NO.

FIELD

TYPE

CONSTRINTS

DESCRIPTION

1
2
3

Fid
userid
date

Int(10)
Int(10)
date

Primary key
Foreign Key
Not Null

4
5
6

Fusername
Faddress
comments

Varchar(30)
Varchar(40)
Varchar(100)

Not null
Not null
Not null

feedback id
User id
Date of
feedbavk
From username
From address
comments

SL NO.

FIELD

TYPE

CONSTRINTS

DESCRIPTION

eid

Int(10)

Primary key

Email id

2
3
4
5
6
7
8
9

userid
Fusername
Faddress
Date_receive
Subject
Content
Important
I_attachment

Int(10)
Varchar(30)
Varchar(40)
Date
Varchar(20)
Varchar(100)
boolean
blob

Foreign Key
Not null
Not null
Not null
Null
Null
Not null
Null

10
11

fg
cnt

Int(1)
Int(1)

Not null
Not null

User id
From username
From address
Date of receive
Subject
Content
Important
Inbox
attachment
flag
count

SL NO.

FIELD

TYPE

CONSTRINTS

DESCRIPTION

1
2
3
4
5
6
7
8

pid
userid
Faddress
Date_receive
Subject
Content
Fusername
F_attachment

Int(10)
Int(10)
Varchar(40)
Date
Varchar(20)
Varchar(100)
Varchar(40)
blob

Primary key
Foreign Key
Not null
Not null
Null
Null
Not null
Null

important

Int(1)

Not null

phish id
User id
From address
Date of receive
Subject
Content
From username
From
attachment
important

TABLE7: INBOX

TABLE8: PHISHBOX

CCSIT Thalikkulam

34

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

TABLE9: PHISHING
SL NO.

FIELD

TYPE

CONSTRINTS

DESCRIPTION

1
2
3
4
5
6
7

Ppid
userid
username
url
Hyperlink
Domain_name
Sel_person

Int(10)
Int(10)
Varchar(40)
Varchar(40)
Varchar(40)
boolean

Primary key
Foreign Key
Null
Not null
Null
Null
Not null

phishing id
User id
Username
Phishing url
Hyperlink
Domain name
Selected person

varchar(40

TABLE 10: REGISTRATION


SL NO.

FIELD

TYPE

CONSTRINTS

DESCRIPTION

1
2
3
4
5
6
7
8
9
10

Userid
fname
Username
Password
Birthday
Gender
Mobile_no
Country
Curr_mail
Sec_que

Int(11)
Varchar(30)
Varchar(40)
Varchar(20)
Date
Varchar(3)
Int(13)
Varchar(20)
Varchar(40)
Varchar(50)

Primary key
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null

11
12
13

Sec_ans
image
online

Varchar(10)
Blob
boolean

Not null
Null
Not null

User id
Full name
User name
Password
Birth date
Gender
Mobile number
Country
Current mail
Security
question
Security answer
Image
online

SL NO.

FIELD

TYPE

CONSTRINTS

DESCRIPTION

1
2
3
4
5

Sid
userid
Taddress
Date_sent
S_subject

Int(10)
Int(10)
Varchar(40)
Date
Varchar(20)

Primary key
Foreign Key
Not null
Not null
Null

6
7
8

S_content
S_important
S_attachment

Varchar(100)
Boolean
blob

Null
Not null
Null

Sentmail id
User id
To address
Date of send
Send mail
subject
Send content
Send important
Send
attachment

TABLE11: SENTBOX

CCSIT Thalikkulam

35

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

TABLE12: TRASH
SL NO.

FIELD

TYPE

CONSTRINTS

DESCRIPTION

1
2
3
4
5
6
7

Tid
userid
Taddress
Date_receive
Content
Date_del
T_attachment

Int(10)
Int(10)
Varchar(40)
Date
Varchar(100)
Date
blob

Primary key
Foreign Key
Not null
Not null
Null
Not null
Null

fwhere

Int(2)

Not null

Trash id
User id
To address
Date of receive
Content
Date of deletion
Trash
attachment
From Where

SL NO.

FIELD

TYPE

CONSTRINTS

DESCRIPTION

1
2
3
4

wid
userid
wusername
hyperlink

Int(10)
Int(10)
Varchar(40)
Varchar(20)

Primary key
Foreign Key
Not null
Not null

Admin id
User id
Whiteusername
hyperlink

TABLE13: WHITEBOX

CCSIT Thalikkulam

36

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

SYSTEM DEVELOPMENT

CCSIT Thalikkulam

37

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

5. SYSTEM DEVELOPMENT
5.1. CODING STRUCTURE
The code design should be such that with less amount of coding we can achieve
more results. The speed of the system will be more if the coding is less.
Whether the data in the system is usable and readable by the system is
depending on the coding.
In the project, the coding is being done such that proper validations are
made to get the perfect input. No error inputs are accepted. In addition care is
taken such that the data integrity and referential integrity is not violated in the
database. In addition, coding is designed such that concurrency avoidance of
accessing the database, limited user access to the table is made perfect.
Development Approach
Top-down approaches emphasize planning and a complete understanding
of the system. It is inherent that no coding can begin until a sufficient level of
detail has been reached in the design of at least some part of system.
Programming, actually writing software code is just one part of the process,
which is why people prefer to be called developers rather than merely
programmers. Top-down programming is a programming style, the mainstay of
traditional procedural languages, in which design begins by specifying complex
task and then dividing them into separate modules. Eventually, the components
are specific enough to be coded and the program is written. The waterfall model
is a sequential design process, often used in software development processes, in
which progress is seen as flowing steadily downwards (like a waterfall) through

CCSIT Thalikkulam

38

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

the

phases

of

Initiation,

Analysis,

Design,

Code,

Testing,

Production/Implementation and Maintenance.


Advantages of waterfall model:
It is the simplest software process model in terms of complexity
and ease of implementation.
This model is extremely easy to understand and therefore, is
implemented at various project management levels

FRONT END SOFTWARE


PHP
At present this system has lots of manual work which need to be computerized
.So lots of paper work is needed. In order to minimize this, computerize all the
details inside the college. There are various technologies available to complete
this project .But this system will choose widely used scripting language PHP is
front end and MySQL as back end according to the following reasons
PHP: Hypertext Preprocessor is a widely used, general-purpose scripting
language that was originally designed for web development to produce dynamic
web pages. For this purpose, PHP code is embedded into the HTML source
document and interpreted by a web server with a PHP processor module, which
generates the web page document. As a general-purpose programming
language. PHP code is processed by an interpreter application in command-line
mode performing desired operating system operations and producing program
output on its standard output channel.

CCSIT Thalikkulam

39

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

It may also function as a graphical application. PHP is available as a


processor for most modern web servers and as standalone interpreter on most
operating systems and computing platforms. PHP was originally created by
Rasmus Lerdorf in 1995 and has been in continuous development ever since.
The main implementation of PHP is now produced by the PHP group and serves
as the de facto standard for PHP as there is no formal specification. PHP is free
software released under the PHP License.
Usage:
PHP is a general-purpose scripting language that is especially
suited to server-side web development where PHP generally runs on a web
server. Any PHP code in a requested file is executed by the PHP runtime,
usually to create dynamic web page content. It can also be used for commandline scripting and client-side GUI applications. PHP can be deployed on most
web servers, many operating systems and platforms, and can be used with many
relational database management systems. It is available free of charge, and the
PHP Group provides the complete source code for users to build, customize and
extend for their own use.

BACK END SOFTWARE


MySQL
MySQL is the world's most popular open source database software, with over
100 million copies of its software downloaded or distributed throughout its
history. With its superior speed, reliability, and ease of use, MySQL has become
the preferred choice for Web, Web 2.0, SaaS, ISV, Telecom companies and
forward-thinking corporate IT Managers because it eliminates the major

CCSIT Thalikkulam

40

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

problems associated with downtime, maintenance and administration for


modern, online applications.
Many of the world's largest and fastest-growing organizations use
MySQL to save time and money powering their high-volume Web sites, critical
business systems, and packaged software including industry leaders such as
Yahoo!,

Alcatel-Lucent,

Google,

Nokia,

YouTube,

Wikipedia,

and

Booking.com.
The flagship MySQL offering is MySQL Enterprise, a comprehensive set
of production-tested software, proactive monitoring tools, and premium support
services available in an affordable annual subscription.
MySQL is a key part of LAMP (Linux, Apache, MySQL, PHP / Perl /
Python), the fast-growing open source enterprise software stack. More and more
companies are using LAMP as an alternative to expensive proprietary software
stacks because of its lower cost and freedom from platform lock-in.
Features of MySQL: Ease of useGo from download to complete installation in less than
15 minutes
Low TCODeploy MySQL for mission-critical applications with
significant cost savings over Microsoft SQL Server
Scalability and performanceMeet the scalability and performance
requirements of the most trafficked web sites and the most demanding
applications
Production supportOracle Premier Support helps lower the total
cost and risk of owning your MySQL solutions

CCSIT Thalikkulam

41

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

TESTING AND
IMPLEMENTATION

CCSIT Thalikkulam

42

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

6. TESTING AND IMPLEMENTATION


6.1. SYSTEM TESTING
Testing is vital to the success of the system. System testing makes a
logical assumption that if all parts of the system are correct, the goal will be
successfully achieved. In the testing process we test the actual system in an
organization and gather errors from the new system operates in full efficiency as
stated. System testing is the stage of implementation, which is aimed to
ensuring that the system works accurately and efficiently.
In the testing process we test the actual system in an organization and
gather errors from the new system and take initiatives to correct the same. All
the front-end and back-end connectivity are tested to be sure that the new
system operates in full efficiency as stated. System testing is the stage of
implementation, which is aimed at ensuring that the system works accurately
and efficiently.
The main objective of testing is to uncover errors from the system. For
the uncovering process we have to give proper input data to the system. So we
should have more conscious to give input data. It is important to give correct
inputs to efficient testing.
Testing is done for each module. After testing all the modules, the modules
are integrated and testing of the final system is done with the test data, specially
designed to show that the system will operate successfully in all its aspects
conditions. Thus the system testing is a confirmation that all is correct and an
opportunity to show the user that the system works. Inadequate testing or non-

CCSIT Thalikkulam

43

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

testing leads to errors that may appear few months later. This will create two
problems:
Time delay between the cause and appearance of the problem.
The effect of the system errors on files and records within the
system.

The purpose of the system testing is to consider all the likely variations to
which it will be suggested and push the system to its limits. The testing process
focuses on logical intervals of the software ensuring that all the statements have
been tested and on the function intervals (i.e.,) conducting tests to uncover
errors and ensure that defined inputs will produce actual results that agree with
the required results.
Testing has to be done using the two common steps
Unit testing
Integration testing.
In the project system testing is made as follows:
The procedure level testing is made first. By giving improper inputs, the
errors occurred are noted and eliminated.
This is the final step in system life cycle. Here we implement the tested
error-free system into real-life environment and make necessary changes, which
runs in an online fashion. Here system maintenance is done every months or
year based on company policies, and is checked for errors like runtime errors,
long run errors and other maintenances like table verification and reports.

CCSIT Thalikkulam

44

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Introduction
The most important phase in system development life cycle is system
testing. The number and nature of errors in a newly designed system depends
on the system specifications and the time frame given for the design.
A newly designed system should have all the subsystems working
together, but in reality each

subsystems work independently. During this

phase, all the subsystems are gathered into one pool and tested to determine
whether it meets the user requirements.
Testing is done at two level -Testing of individual modules and testing
the entire system. During the system testing, the system is used experimentally
to ensure that the software will run according to the specifications and in the
way the user expects. Each test case is designed with the intent of finding errors
in the way the system will process

TYPES OF TESTING
System testing is the process in which the system undergoes experimental
testing so as to check that the system does not fail i.e. to check whether the
required system is running according to specification and user expectation.
System testing also tests to find discrepancies between the system and its
original objective, current specification and systems documentation. Hence
most useful and practical approach is with the understanding that testing is the
process of executing a program with the explicit intention of finding errors that
is making the program fail.

CCSIT Thalikkulam

45

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Testing
Is considered to be the least creative phase of the whole cycle of system
design. In the real sense it is the phase, which helps to bring out the creativity of
the other phases make it shine.

Types of testing
Testing forms a core part of any project. There are various types of testing are
there. In this system we are done following testing.
White Box Testing
Black Box Testing
Unit Testing
Integration Testing
User Interface Testing

White Box Testing:


White Box testing, sometimes called glass box, is a test case design method that
uses the control structure of the procedural design to derive test cases. Using
white box testing methods, we can derive test case that
Guarantee that all independent paths with a module have been exercised
at least once.
Exercise all logical decisions on their true and false sides.
Execute all loops at their boundaries and within their operational bounds.
Exercise internal data structures to ensure their validity.

CCSIT Thalikkulam

46

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

BlackBox Testing:

Black box testing focuses on the functional requirements of the software. That
is, black box testing enables the software engineer to derive sets of input
conditions that will fully exercise all functional requirements for a program.
Black Box testing is not an alternative to white box testing. Rather it is a
complementary approach that is likely to uncover a different class of errors than
white box method.
Black Box testing attempts to find errors in the following categories.
Incorrect or missing functions
Interface errors
Error in data structures on external datea base access
Performance errors
Initialization and termination errors.
Unlike white box testing, which is performed early on the testing process
black box testing tends to be applied during later stages of testing because black
box testing which is purposely disregards control structures attention is focused
on the information domain.

Unit Testing:
Unit testing focuses verification error on the smallest unit of software design the
module. Using the procedural design description as a guide, important control
paths are tested to uncover errors with the boundary of module. The relative
complexity of test and uncovered errors is limited by the constrained scope
established for unit testing. The unit test is normally white box oriented and the
step can be conducted in parallel for multiple modules. The module interface is
tested to ensure that information properly flows into and out of the program unit

CCSIT Thalikkulam

47

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

under test. The local data structure is examined to ensure that data stored
temporarily maintains its integrity during all steps in an algorithms execution.
Boundary conditions are tested to ensure that the module operates properly at
boundaries established to limit or restrict processing. All independent paths
through the control structure are exercised to ensure that all statements in a
module have been executed at least once. And finally, all handling paths are
tested.

Unit Test Procedures:


Unit testing is normally considered as an adjunct to the coding step. After
source level code has been developed, reviewed and verified for correct syntax,
unit test case design review of design information provides guidance for
establishment test cases that are likely to uncover all errors.
Because a modules is not a standalone program, deriver and/or sub
software must be developed for each unit test. In most applications a driver is
nothing more than a main program that accepts test case date, passes such
data to the modules (to be tested) and brings relevant results. Stubs serve to
replace modules that are subordinate to (called by) the module to be tested. A
stub or dummy subprogram uses the subordinate modules interface, may do
minimal data manipulation, prints verification of entry and returns.
Drivers and stubs represent overhead. That is both the software that must
be developed but that is not delivered with the final software products drivers
and stubs are kept simple, actual overhead is relatively low.
Unit testing is simplified when a module with high cohesion is designed.
When only one function is addressed by a module, the number of test cases id
reduced and errors can predicated and uncovered.

CCSIT Thalikkulam

48

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

User Interface Testing:


An interactive interface is a system that is dominated by interaction between the
subsystem and external agents, such a humans, devices or other program. The
external agents are independent of the system, so their inputs cannot be
controlled, although the system may solicit response from them. An interactive
interface usually includes only part of an entire application, one that can often
be handled independently form the computational part of the application.

The major concerns of an interactive interface are the communications


protocol between the system and the external agents, the syntax of possible
interactions the presentation of output, the flow of control with in the system,
the case of understanding and user interface performance and error handling.

CCSIT Thalikkulam

49

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

6.2. IMPLEMENTATION

Implementation is the most crucial stage in achieving a successful system


and giving the users confidence that the new system is effective and workable.
Implementation of this project refers to the installation of the package in its real
environment to the full satisfaction of the users and operations of the system.
Testing is done individually at the time of development using the data and
verification is done the way specified in the program specification. In short,
implementation constitutes all activities that are required to put an already tested
and completed package into operation. The success of any information system
lies in its successful implementation.
System Implementation is the stage in the project where the theoretical
design is turned into a working system. The most critical stage is achieving a
successful system and in giving confidence on the new system for the user that
it will work efficiently and effectively. The existing system was long time
process.
The project execution was checked with live environment and the user
requirements are satisfied. Proper implementation is essential to provide a
reliable system to meet the organization requirements. Implementation is the
stage of the project where the theoretical design is turned into a working system.
Implementation is the process of converting a new or a revised system design
into an operational one. The objective is to put the tested system into operation
while holding cost, risks and personnel irritation to a minimum. It involves
careful planning, investigation of the current system and its constraints on

CCSIT Thalikkulam

50

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

implementation, design of methods to achieve the change over, an evaluation of


change over methods.
An implementation co ordination committee based on policies of individual
organization has been appointed.

The implementation process begins with

preparing a plan for the implementation of the system. According to this plan,
the activities are to be carried out, discussions made regarding the equipment
and resources and the additional equipment has to be acquired to implement the
new system.Implementation is the final and important phase. The system can
be implemented only after through testing is done and if it found to be working
according to the specification. This method also offers the greatest security
since the old system can take over if the errors are found or inability to handle
certain type of transactions while using the new system.

Planning and Control:


The implementation of the system involves people from different departments,
in effective control of implementation results in the failure of the system. The
use of the committee for carrying out the implementation function may prove
useful.

Education and Training:


To achieve the benefits and objectives expected from Computer Based Systems
(online system), it is essential for the users to be involved with the system. If the
system becomes more complex the need for education and training is more and
more important.

CCSIT Thalikkulam

51

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Adequate training was given to the staff at the main office, regarding the use of
the system, and a one-day technical meet was held at the main office for all
technical heads of al franchisees. The methods to be followed were taught to
them for the client side. The students who are the end users of the software need
not be trained because the software is very user friendly and anyone can easily
handle it, by reading the instructions given, and follow it correctly.

User Training
After the system is implemented successfully, training of the user is one of the
most important sub tasks of the developer. For this purpose user manuals are
prepared and handled over to the user to operate the developed system. Thus
the users are trained to operate the developed system. Both the hardware and
software securities are made to run the developed systems successfully in
future. In order to put new application system into use, the following activities
were taken care of

Preparation of user and system documentation


Conducting user training with demo and hands on
Test run for some period to ensure smooth switching over the system.

The users are trained to use the newly developed function.

User manuals

describing the procedures for using the functions are circulated to all the users.
It is confirmed that the system is implemented up to users need and expectations

CCSIT Thalikkulam

52

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

The common approaches are :


Parallel Conversion
In parallel conversion the existing system and new system operate
simultaneously until the project team is confident that the new system is
working properly. The outputs from the old system continue to be distributed
until the new system has proved satisfactorily Parallel Conversion is a costly
method because of the amount of duplication involved.

Direct Conversion
Under direct conversion method the old system is discontinued altogether and
the new system becomes operational immediately. A greater risk is associated
with direct conversion is no backup in the case of system fails.

CCSIT Thalikkulam

53

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

MAINTENANCE

CCSIT Thalikkulam

54

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

7. SYSTEM MAINTANENCE
The objectives of this maintenance work are to make sure that the system gets
into work all time without any bug. Provision must be for environmental
changes which may affect the computer or software system. This is called the
maintenance of the system. Nowadays there is the rapid change in the software
world. Due to this rapid change, the system should be capable of adapting these
changes. In our project the process can be added without affecting other parts of
the system.
Maintenance plays a vital role. The system liable to accept any
modification after its implementation. This system has been designed to favor
all new changes. Doing this will not affect the systems performance or its
accuracy.
The objectives of this maintenance work are to make sure that the system gets
into work all time without any bug. Provision must be for environmental
changes which may affect the computer or software system. This is called the
maintenance of the system. Nowadays there is the rapid change in the software
world. Due to this rapid change, the system should be capable of adapting these
changes.
In our project the process can be added without affecting other parts of
the system. Maintenance plays a vital role. The system is liable to accept any
modification after its implementation. This system has been designed to favor
all new changes. Doing this will not affect the systems performance or its
accuracy.

CCSIT Thalikkulam

55

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

In the project system testing is made as follows:


The procedure level testing is made first. By giving improper inputs, the
errors occurred are noted and eliminated. Then the web form level testing is
made. For example storage of data to the table in the correct manner.
In the form, the zero length username and password are given and
checked. Also the duplicate username is given and checked. The client side
validations are made. The dates are entered in wrong manner and checked.
Wrong email-id is given and checked.
This is the final step in system life cycle. Here we implement the tested
error-free system into real-life environment and make necessary changes, which
runs in an online fashion. Here system maintenance is done every months or
year based on company policies, and is checked for errors like runtime errors,
long run errors and other maintenances like table verification and reports.
Implementation is the stage of the project when the theoretical design is
turned out into a working system. Thus it can be considered to be the most
critical stage in achieving a successful new system and in giving the user,
confidence that the new system will work and be effective.
The implementation stage involves careful planning, investigation of the
existing system and its constraints on implementation, designing of methods to
achieve changeover and evaluation of changeover methods.
Implementation is the process of converting a new system design into
operation. It is the phase that focuses on user training, site preparation and file
conversion for installing a candidate system. The important factor that should be
considered here is that the conversion should not disrupt the functioning of the
organization.
CCSIT Thalikkulam

56

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

SCOPE FOR FUTURE


ENHANCEMENT

CCSIT Thalikkulam

57

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

8. FUTURE ENHANCEMENT

Our future work includes further extending the oppa Phishing algorithm,
so that it can handle Cross Site Scripting (CSS) attacks. Cross-site scripting
(CSS) is a type of computer security vulnerability typically found in web
applications which allow code injection by malicious web users into the web
pages viewed by other users. Examples of such code include HTML code and
client-side scripts. An exploited cross-site scripting vulnerability can be used by
attackers to bypass access controls such as the same origin policy.
Vulnerabilities of this kind have been exploited to craft powerful phishing
attacks and browser exploits. Cross-site scripting was originally referred to as
CSS, although this usage has been largely discontinued due to the confusion
with cascading style sheets.

CCSIT Thalikkulam

58

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

CONCLUSION

CCSIT Thalikkulam

59

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

9. CONCLUSION

Phishing has becoming a serious network security problem, causing


finical lose of billions of dollars to both consumers and e-commerce companies.
And perhaps more fundamentally, phishing has made e-commerce distrusted
and less attractive to normal consumers. In this paper, we have studied the
characteristics of the hyperlinks that were embedded in phishing e-mails. We
then designed an anti-phishing algorithm, oppa Phishing algorithm, based on
the derived characteristics. Since Phishing Guard is characteristic based, it can
not only detect known attacks, but also is effective to the unknown ones.
We have implemented oppa Phishing algorithm for Windows
XP. Our experiment showed that this algorithm is light-weighted and can detect
up to 95% unknown phishing attacks in real-time. We believe that oppa
Phishing algorithm is not only useful for detecting phishing attacks, but also can
shield users from malicious or unsolicited links in Web pages and Instant
messages. Our future work includes further extending the oppa Phishing
algorithm , so that it can handle CSS (cross site scripting) attacks.

CCSIT Thalikkulam

60

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

SCREEN LAYOUT

CCSIT Thalikkulam

61

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

10. SCREEN SHOTS


USER PAGES
Registration page

Login page

CCSIT Thalikkulam

62

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

About

Inbox

CCSIT Thalikkulam

63

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Compose Mail

Blacklist view

CCSIT Thalikkulam

64

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Feedback

ADMIN PAGES
Admin login

CCSIT Thalikkulam

65

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Userlist View

Change Details

CCSIT Thalikkulam

66

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Feedback view & reply

Notification send

CCSIT Thalikkulam

67

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

Blacklist view & Add

Whitelist view & Add

CCSIT Thalikkulam

68

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

BIBLIOGRAPHY

CCSIT Thalikkulam

69

OPPA MAIL SERVICES

Project report 2015

UNIVERSITY OF CALICUT

11. BIBLIOGRAPHY

Books and Tutorials

Book : Php And Mysql In Easy by Mike Mcgrath

Book : Beginning PHP and MySQL by Jason Gilmore

Matthew Mac Donald:The Complete Reference PHP

Kalen Delaney: Inside MYSQL Server

James A. Sam : Database Management System

Roger S. Pressman : "Software Engineering

James Hoffman: Introduction to Structured QueryLanguage,4th Edition

John Stubbe, Marvin Gore: Elements of System Analysis

Microsoft PHPQuickStart Tutorial

Website
www.google.com
www.wikipedia.com
www.sourcecode.com
books.rediff.coms

CCSIT Thalikkulam

70

OPPA MAIL SERVICES

Potrebbero piacerti anche