Review of Various Methods for Phishing Detection

Journal Title: EAI Endorsed Transactions on Energy Web - Year 2018, Vol 5, Issue 20

Abstract

In this modern world where the technology has spread rapidly and the inception of cell phones, computers and also the rate at which internet is being used has increased in all fields both commercial, financial and also individuals. The above said inception is a boon but the users are facing dangerous challenges. Hence phishing and information pilfering which are done through spams and deceptive emails. This kind of spams and deceptive emails could lead to great losses for institutions like financial and similar ones. It is understood that in the beginning it is very difficult to judge or trace the modesoprandi of these hackers. To ascertain this cryptic methods of phishing attacks can be effectively done only by developing a particular software thereby safe guard the users. To pick out and detect the operation methods of hackers, the researcher uses the Data Mining process where a number of datamining tools, which analysis the data are used. This learning, basically is Data Miming process and the informations are taken out through different outlets and sources.

Authors and Affiliations

R. Sakunthala jenni, S. Shankar

Keywords

Related Articles

The system of nonlinear adaptive control for wind turbine with DFIG

This paper presents a problem solution of the stable voltage generating in the changing terms of environment for the double-fed induction generator (DFIG). For this, in nonlinear multivariable systems, such as mathematic...

Conceptual Semantic Model for Web Document Clustering Using Term Frequency

Term analysis is the key objective of most of the methods under text mining, here term analysis either refers to a word or a phrase. Determination of the documents subject is another important task to be performed by the...

Demand Response an Alternative Solution to Prevent Load Shedding Triggering

This paper investigates an alternative solution to prevent Load Shedding (LS) triggering during underfrequency and proposes a new technique to restore the frequency during emergency events. Demand response (DR) is consid...

Justifying and choosing parameters of the wind power installation with an automatically controlled sailing working body

The article considers a wind power installation, which significantly differs from the other existing wind power installations in that it has rocking an automatically controlled sail of a toroidal shape and a manipulator...

Consensus-based distributed control for economic dispatch problem with comprehensive constraints in a smart grid

Economic dispatch problem (EDP) has become more complex and challenging in power systems due to the introduction of smart grids. In a smart grid, it’s expensive and unreliable for the existing centralized controller to a...

Download PDF file
  • EP ID EP45406
  • DOI http://dx.doi.org/10.4108/eai.12-9-2018.155746
  • Views 217
  • Downloads 0

How To Cite

R. Sakunthala jenni, S. Shankar (2018). Review of Various Methods for Phishing Detection. EAI Endorsed Transactions on Energy Web, 5(20), -. https://www.europub.co.uk/articles/-A-45406