Open Access Open Access  Restricted Access Subscription Access

Phishing Alert

Shweta Kalekar

Abstract


Phishing is a sort of friendly designing assault where the assailant attempts to copy the first site to take the client's delicate information like login certifications, charge card numbers SSN numbers, and so forth. The aggressor baits the casualty to enter his own information by taking on the appearance of unique site. The data is then used to get to significant records and can bring about wholesale fraud and monetary misfortune. No particular arrangement is executed till date to counter the phishing assaults actually. In this paper we exploit the visual comparability highlights like CSS of html report and the disparity between the guaranteed space of the dubious website page and the harmless site page to distinguish a phishing assault.


Full Text:

PDF

References


Khonji, M., Iraqi, Y., & Jones, A. (2013). Phishing detection: a literature survey. IEEE Communications Surveys & Tutorials, 15(4), 2091-2121.

Granova, A., & Eloff, J. H. P. (2005). A legal overview of phishing. Computer Fraud & Security, 2005(7), 6-11.

James, J., Sandhya, L., & Thomas, C. (2013, December). Detection of phishing URLs using machine learning techniques. In 2013 international conference on control communication and computing (ICCC) (pp. 304-309). IEEE.

Mao, J., Tian, W., Li, P., Wei, T., & Liang, Z. (2017). Phishing-alarm: Robust and efficient phishing detection via page component similarity. IEEE Access, 5, 17020-17030.

Salekar, S. Phishing Alarm.

http://www.phishing.org/history-of- phishing


Refbacks

  • There are currently no refbacks.