Developing a Model to Detect E-mail Address Spoofing using Biometrics Technique
A. S. Zadgaonkar1, Suresh Kashyap2, Murari Chandra Patel3

1Dr. A. S. Zadgaonkar, Vice Chancellor, Dr. C. V. Raman University, Kargiroad, Kota, Bilaspur, (C.G.),India.
2Suresh Kashyap, Assistant Professor, Dr. C. V. Raman University, Kargiroad, Kota, Bilaspur, India.
3Murari Chandra Patel, Research scholar, Dr. C. V. Raman University, Kargiroad, Kota, Bilaspur, (C.G.),India.
Manuscript received on May 05, 2013. | Revised Manuscript received on May 11, 2013. | Manuscript published on May 15, 2013. | PP: 63-65 | Volume-1 Issue-6, May 2013. | Retrieval Number: F0307051613/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Email changed the way we communicate in today’s highly technical world. Its usage increased tremendously in the last few years and millions of user’s world wide joined this technological revolution that made the world look so small and at our disposal. The widespread use of email caused the number of warnings being made about the dark side our technological revolution to increase and we are becoming uniquely vulnerable to many mysterious and malicious threats. Viruses, worms, and other forms of malicious software started targeting our email inboxes to propagate. Spam and other forms of unsolicited bulk electronic commerce started filling our email inboxes and invading our privacy. Phishing and other forms of fraud attacks have been using email as their primary communication channel to trick users into giving out their credentials. Email could have been a killer application for the Internet if none of the problems mentioned above exist.
Keywords: Threats. Viruses, worms, Security, Internet, Email.