Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Source Code Block to Bring Down Phishing Attacks


Affiliations
1 Vidyavardhaka College of Engineering, Mysuru, India
     

   Subscribe/Renew Journal


Cyber-attacks are the attacks carried out mainly over the internet and victims being the internet users. Phishing is a malicious activity aimed at collecting sensitive user information, by recreating an environment that has similarity in functionalities and appearance to the one that manages this information. Phishing most commonly occurs on the Web and mainly initiated via an email where the user is redirected to a malicious website that is a copy of the legitimate website and the objective of which is to capture the information to impersonate the user on the original Website and access the user’s personal confidential data. Seeing the truth here we suggest a preventive anti-phishing technique to keep the users away from to be victims of phishing attacks.


Keywords

Cyber Attacks, Hacker, Internet, Phishing, Malicious.
User
Subscription Login to verify subscription
Notifications
Font Size

  • PhishMe Report - https://www.darkreading. com/endpoint /91-- of - cyberattacks - start - with -a-phishing-email/d/d-id/1327704?.
  • A Machine - Learning Approach to Phishing Detection and Defense - Iraj Sadegh Amiri, O.A. Akanbi, E. Fazeldehkordi.
  • GoldPhish - Cyber Risk Management Solutions https://goldphish.com/.
  • Anti-phishing Extension for Google Chrome https //www.theverge.com/2015/4/29/8513123/ phishing-password-alert-google-chrome-extension.
  • Netcraft. Netcraft anti-phishing tool bar. http://toolbar.netcraft.com/.
  • Wu, M., R. C. Miller and S. L. Garfinkel. 2006. Do Security Toolbars Actually Prevent Phishing Attacks? In the Conference on Human Factors in Computing Systems. http: //www.simson.net/ref/2006/CHI-security-toolbarfinal.pdf.
  • Large-Scale Automatic Classification of Phishing Pages, Colin Whittaker, Brian Ryner and Marria Nazif.
  • Fette, I., N. Sadeh and A. Tomasic. Learning to Detect Phishing Emails. 2006. ISRI Technical report, CMU-ISRI- 06-112. Retrieved Sep 2, 2006, http://reportsarchive. adm.cs.cmu.edu/anon/isri2006 /CMU-ISRI-06-112.pdf.
  • Phishing Attacks 2017 - https://www.info security-magazine.com /opinions /why-2017-phishing-attacks-teach/.
  • Notable Phishing Scams - http://resources. infosecinstitute.com /top-ten-phishing-scams/# gref.
  • R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In Proceedings of the SIGCHI conference on Human Factors in computing systems, ACM, 2006.
  • Microsoft-ASSOCHAM survey - https:// economictimes. indiatimes.com / tech/ites/bpo - firms - lack-seriousness - on - cyber - fraud - threats-assocham-microsoft-survey/articleshow / 63529636.cms

Abstract Views: 231

PDF Views: 4




  • Source Code Block to Bring Down Phishing Attacks

Abstract Views: 231  |  PDF Views: 4

Authors

Somraj Chowdhury
Vidyavardhaka College of Engineering, Mysuru, India
H. L. Gururaj
Vidyavardhaka College of Engineering, Mysuru, India

Abstract


Cyber-attacks are the attacks carried out mainly over the internet and victims being the internet users. Phishing is a malicious activity aimed at collecting sensitive user information, by recreating an environment that has similarity in functionalities and appearance to the one that manages this information. Phishing most commonly occurs on the Web and mainly initiated via an email where the user is redirected to a malicious website that is a copy of the legitimate website and the objective of which is to capture the information to impersonate the user on the original Website and access the user’s personal confidential data. Seeing the truth here we suggest a preventive anti-phishing technique to keep the users away from to be victims of phishing attacks.


Keywords


Cyber Attacks, Hacker, Internet, Phishing, Malicious.

References