Legitimate Mail Sender Verification and Flood Attack Detection Using Java Networking and Swing UI
DOI:
https://doi.org/10.32628/CSEIT25111674Abstract
With the growing prevalence of cyber threats, securing email communication is essential. This paper presents a Legitimate Mail Sender Verification and Flood Attack Detection System developed using Java Networking and Swing UI. The system comprises client and server modules, enabling user registration, authentication, and secure email exchange. To ensure sender legitimacy, email bodies are encrypted using AES, and MD5 hashes are used for signature verification. The server records the sender’s IP address and prompts users to validate it. A mismatch results in sender blocking. On the receiver's end, signature validation confirms message integrity. Any inconsistency flags the message as a flood attack. Additionally, a simulated attacker module allows testing by modifying messages mid-transit, aiding in real-time detection. This approach integrates encryption, digital signature validation, and IP tracking to protect against spoofing, tampering, and denial-of-service threats in email systems.
📊 Article Downloads
References
A. Karim, S. Azam, B. Shanmugam, K. Kannoorpatti. and M. Alazab: “A comprehensive survey for intelligent spam email detection,” IEEE Access, Vol. 7, pp. 168261-168295, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2954791
The Spamhaus Project: https://www.spamhaus.org/
DNS Whitelist - Protect against false positives: https://www.dnswl.org/
S. Kitterman: “Sender policy framework(SPF) for authorizing use of domains in email, version 1,” RFC7208, 2014. DOI: https://doi.org/10.17487/rfc7208
D. Crocker, T. Hansen, M. Kucherawy: “DomainKeys identified mail (DKIM) signature,” STD 76, RFC6376, 2011. DOI: https://doi.org/10.17487/rfc6376
M. Kucherawy and E. Zwicky: “Domain-based message authentication, reporting, and conformance (DMARC),” RFC7489, 2015. DOI: https://doi.org/10.17487/rfc7489
S. Sakuraba, M. Yoda, Y. Sei, Y. Tahara and A. Ohsuga, “Sender reputation construction method using sender authentication technologies,” IPSJ Journal, Vol.62, No.5, pp. 11731183, 2021. DOI: https://doi.org/10.1109/ICDSCA53499.2021.9650213
S. Sakuraba: “Messaging technology,” IIJ Internet Infrastructure Review (IIR), Vol. 47, pp.4-9, 2020, https://www.iij.ad.jp/en/dev/iir/pdf/iir vol47 EN.pdf
K. Konno, N. Kitagawa, S. Sakuraba, and N. Yamai: “Legitimate email forwarding server detection method by X-means clustering utilizing DMARC reports,” Eleventh Internation Conference on Evolving Internet (INTERNET 2019), pp
M. Schanzenbach, P. Winter, and K. Borgolte: “Measuring email sender validation in the wild,”
Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT 2021), ACM, pp. 318–332, 2021.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.