A rule based approach for detecting Phishing attacks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
Phishing attacks are one of the emerging serious threats against personal data security. These attacks are often performed by sending out emails that seem to originate from a trusted party. The objective is to deceive the recipient to release sensitive information such as usernames, passwords, banking details, or credentials. The aim of phishing is to steal a user’s identity in order to make fraudulent transactions as if the Phisher were the user.Though a large number of methods have been proposed and implemented for detecting Phishing attacks, a complete solution is missing. A great amount of research is being carried out to solve this problem using rule based method, browser based method and machine learning approaches but still there are insufficient methods that can be used against Phisher’s novel attacks which they are able change time to time.In this Dissertation entitled “A RULE BASED APPROACH FOR DETECTING PHISHING ATTACKS”, a solution is proposed for organization wide solution; rule set has been proposed for this system to filter out phishing mails at the perimeter of the organization. A balanced rule set has been used to keep false positive and false negative low.
Authors and Affiliations
Vivek Shukla, Mahendra Kumar Rai
Complete Study on Steganography
Data hiding techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications. The method of steganography is used to share the data secretly and securely....
A Three Way Visual Cryptography & its Application in biometric Security : A Review
Visual cryptography provides secured digital transmission which is used only for one time. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image...
Unpropitious Effect of Bisphenol-A and Its Impact on Human Health
Bisphenol A (BPA) is a chemical used in the lining of some food and beverage packaging to protect food from contamination and extend shelf life. It’s also used in non-food products. It has been found that BPA has the po...
slugScheduling Algorithms Implementation for LTE Downlink
The increasing demand for cellular communications leads to the development of Long Term Evolution (LTE). LTE is the evolution for existing 3G mobile networks which offers higher capacity, efficient utilization of radio...
An experimental study of heat transfer intensification in a channel having corrugated plate by using twisted tape as an obstacle
At present, the technology of the twisted-tape inserts is widely used in various industries. Twisted tapes are inserted in a channel which is a passive method for enhancing the heat transfer. Swirls are generated in the...