Design a Client-Side Application with Automatic Real-Time Phishing Detection Mechanism based on the White-Lists
-
2018-12-13 https://doi.org/10.14419/ijet.v7i4.39.23828 -
Phishing detection, Domain Name, Heuristics, URL analysis, Login pages, White-list, Web security -
Abstract
Phishing is a problem involving not to be trusted emails and WebPages that trick unsuspecting users into willingly revealing their confidential information. Phishing is a cyber attack which involves a fake website mimicking the some real legitimate website. In this paper we design, implementation, and evaluation of phishing detection using HTML/CSS, PHP and store the credential details in session for the being time and can work with any authentication technologies which are based on exchange of credentials also discuss the detection of login phishing page that contains email and password, credential fields that provide personal/restricted content. Integrated security feature is one of the best solution for prevention a phishing attacks to secure web browser when-ever a phishing site is accessed by an internet user
Â
Â
 -
References
[1] Cao Y, Han W, Le Y, "Anti-phishing based on automated individual white-list," Proceedings of the 4th Workshop on Digital Identity Management., pp. 51e60,2008.
[2] Deshmukh, J.J. and Chaudhari, S.R., 2014. Cyber crime in indian scenario–a literature snapshot. International Journal of Conceptions on Computing and Information Technology, 2(2).Marc Parenthood, Patrick Rainier, Jacques Tissue.
[3] Jo, I., Jung, E.E. and Yeom, H.Y., 2010, August. You're Not Who You Claim to Be: Website Identity Check for Phishing Detection. In Computer Communications and Networks (ICCCN), 2010 Proceedings of 19th International phishtank.com/. [Accessed 01 July 2016]..
-
Downloads
-
How to Cite
Wadhwa, S., Pratap Srivastava, A., Awasthi, S., & Kumar Singh, M. (2018). Design a Client-Side Application with Automatic Real-Time Phishing Detection Mechanism based on the White-Lists. International Journal of Engineering & Technology, 7(4.39), 147-149. https://doi.org/10.14419/ijet.v7i4.39.23828Received date: 2018-12-12
Accepted date: 2018-12-12
Published date: 2018-12-13