Legitimate Mail Sender Verification and Flood Attack Detection Using Java Networking and Swing UI

Authors

  • Sinchana K R Department of Masters of Computer Application, PES College of Engineering, Karnataka, India Author
  • Prof Dr. H P Mohan Kumar Department of Computer Science and Engineering, PES College of Engineering, Karnataka, India Author

DOI:

https://doi.org/10.32628/CSEIT25111674

Abstract

With the growing prevalence of cyber threats, securing email communication is essential. This paper presents a Legitimate Mail Sender Verification and Flood Attack Detection System developed using Java Networking and Swing UI. The system comprises client and server modules, enabling user registration, authentication, and secure email exchange. To ensure sender legitimacy, email bodies are encrypted using AES, and MD5 hashes are used for signature verification. The server records the sender’s IP address and prompts users to validate it. A mismatch results in sender blocking. On the receiver's end, signature validation confirms message integrity. Any inconsistency flags the message as a flood attack. Additionally, a simulated attacker module allows testing by modifying messages mid-transit, aiding in real-time detection. This approach integrates encryption, digital signature validation, and IP tracking to protect against spoofing, tampering, and denial-of-service threats in email systems.

📊 Article Downloads

References

A. Karim, S. Azam, B. Shanmugam, K. Kannoorpatti. and M. Alazab: “A comprehensive survey for intelligent spam email detection,” IEEE Access, Vol. 7, pp. 168261-168295, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2954791

The Spamhaus Project: https://www.spamhaus.org/

DNS Whitelist - Protect against false positives: https://www.dnswl.org/

S. Kitterman: “Sender policy framework(SPF) for authorizing use of domains in email, version 1,” RFC7208, 2014. DOI: https://doi.org/10.17487/rfc7208

D. Crocker, T. Hansen, M. Kucherawy: “DomainKeys identified mail (DKIM) signature,” STD 76, RFC6376, 2011. DOI: https://doi.org/10.17487/rfc6376

M. Kucherawy and E. Zwicky: “Domain-based message authentication, reporting, and conformance (DMARC),” RFC7489, 2015. DOI: https://doi.org/10.17487/rfc7489

S. Sakuraba, M. Yoda, Y. Sei, Y. Tahara and A. Ohsuga, “Sender reputation construction method using sender authentication technologies,” IPSJ Journal, Vol.62, No.5, pp. 11731183, 2021. DOI: https://doi.org/10.1109/ICDSCA53499.2021.9650213

S. Sakuraba: “Messaging technology,” IIJ Internet Infrastructure Review (IIR), Vol. 47, pp.4-9, 2020, https://www.iij.ad.jp/en/dev/iir/pdf/iir vol47 EN.pdf

K. Konno, N. Kitagawa, S. Sakuraba, and N. Yamai: “Legitimate email forwarding server detection method by X-means clustering utilizing DMARC reports,” Eleventh Internation Conference on Evolving Internet (INTERNET 2019), pp

M. Schanzenbach, P. Winter, and K. Borgolte: “Measuring email sender validation in the wild,”

Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT 2021), ACM, pp. 318–332, 2021.

Downloads

Published

04-08-2025

Issue

Section

Research Articles

How to Cite

[1]
Sinchana K R and Prof Dr. H P Mohan Kumar, “Legitimate Mail Sender Verification and Flood Attack Detection Using Java Networking and Swing UI”, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, vol. 11, no. 4, pp. 322–326, Aug. 2025, doi: 10.32628/CSEIT25111674.