scholarly journals Phishing Website Detection Using ML

Author(s):  
Nikhil K ◽  
Dr. Rajesh D S ◽  
Dhanush Raghavan

Phishing is one kind of cyber-attack , it is a most dangerous and common attack to retrieve personal information, account details, credit card credentials, organizational details or password of a client to conduct transactions. Phishing websites seem to like the relevant ones and it is difficult to differentiate among those websites. It is one of the most threatening that every individuals and organization faced. URLs are known as web sites are by which users locate information on the internet. The review creates warning of phishing attacks, detection of phishing attacks and motivate the practice of phishing prevention among the readers. With the huge number of phishing emails or messages received now days, companies or individuals are not able to find all of them.

Author(s):  
James G. Williams ◽  
Wichian Premchaiswadi

As the volume of purchases for products and services on the Internet has increased and the chosen method of payment is a credit or debit card, e-commerce merchants must be capable of accepting such payment methods. Unfortunately, cyber-criminals have found ways to steal personal information found on credit cards and debit cards and fraudulently use this information to purchase products and services which costs merchants lost revenue and fees for chargebacks. This article discusses the process by which credit card payments are processed beginning with the e-commerce merchant’s web site to a credit card processor or service gateway to the credit card company’s network to the issuing bank’s network with an accept or decline response being returned to the merchant’s shopping cart system via the same networks. The article addresses the issue of credit card fraud in terms of how the cyber-criminals function and the potential solutions used to deter these attempts by the cybercriminals. A list of preventive measures that should be used by e-commerce merchants is provided.


Author(s):  
Eleutherios A. Papathanassiou ◽  
Xenia J. Mamakou

The advent of the Internet has altered the way that individuals find information and has changed how they engage with many organizations, like government, health care, and commercial enterprises. The emergence of the World Wide Web has also resulted in a significant increase in the collection and process of individuals’ information electronically, which has lead to consumers concerns about privacy issues. Many researches have reported the customers’ worries for the possible misuse of their personal data during their transactions on the Internet (Earp & Baumer, 2003; Furnell & Karweni, 1999), while investigation has been made in measuring individuals’ concerns about organizational information privacy practices (Smith, Milberg & Burke, 1996). Information privacy, which “concerns an individual’s control over the processing, that is the acquisition, disclosure, and use, of personal information” (Kang, 1998) has been reported as one of the most important “ethical issues of the information age” (Mason, 1986).


Respati ◽  
2019 ◽  
Vol 14 (2) ◽  
Author(s):  
Agus Fatkhurohman ◽  
Eli Pujastuti

 INTISARIPerkembangan zaman di era modern ini sudah memasuki era revolusi industri 4.0, dimana segala aspek sudah bergantung pada sebuah teknologi. Dimana bentuk teknologi ini sudah bergerak secara otomatis dan saling terhubung dengan jaringan internet. Teknologi yang digunakan sudah bergerak otomatis dan sudah banyak yang menggunakan sebuah system cerdas. Berbicara mengenai jaringan internet dan system cerdas, maka keterkaitan dengan sebuah data yang digunakan akan semakin besar bahkan bisa sampai tergolong data dengan kategori big data. Yang mana tempat penyimpanan data juga harus disesuaikan dengan kebutuhan datanya. Selain dengan kebutuhan data yang semakin besar di era revolusi industry ini yang selalu dikaitkan dengan jaringan internet maka keamanan sebuah data juga perlu dipertanyakan. Secara tidak langsung keamanan data juga bisa menjadi masalah besar. Dengan jaringan internet setiap orang di setiap dunia bisa mengakses sebuah data yang terkoneksi dengan jaringan internet. Tidak asing lagi sekarang sudah banyak kasus pencurian data karena terhubung dengan jaringan internet. Kasus pencurian data ini sering memanfaatkan website sebagai sarana untuk mencuri datanya yang sering disebut dengan istilah website phising. Phishing masih menjadi vektor serangan teratas yang memberi akses ke penyerang untuk membuka informasi pribadi seperti kredensial login dan nomor kartu kredit. Pada 2017 lalu, Indonesia menempati urutan ke-9 jumlah serangan phising yakni satu phishing insiden per 2.380 email. Laporan terbaru F5 yang bertajuk menyebutkan, insiden penipuan (fraud) pada Oktober, November, dan Desember melonjak 50% dari rata-rata tahunan. Berpura-pura menjadi seseorang atau entitas yang terkenal adalah taktik utama. Sebanyak 71% serangan phishing pada periode 1 september – 31 Oktober 2018 menggunakan modus mengaku dari perusahaan terkenal, khususnya di industri teknologi.Kata kunci :  jaringan, internet, sistem cerdas, website phising, serangan. ABSTRACT        The development of the era in this modern era has entered the era of industrial revolution 4.0, where all aspects have depended on a technology. Where this form of technology has moved automatically and interconnected with internet networks. The technology used has moved automatically and many have used an intelligent system. Talking about the internet network and intelligent systems, the linkages with the data used will be even greater and can even be classified as data with the big data category. Which is where the data storage must also be adjusted to the data requirements. In addition to the increasing data requirements in the industrial revolution era which are always associated with the internet network, the security of a data also needs to be questioned. Indirectly data security can also be a big problem. With the internet network everyone in every world can access a data that is connected to the internet network. No stranger now there are many cases of data theft because it is connected to the internet network. This data theft case often uses websites as a means to steal data which is often referred to as phishing websites.        Phishing is still the top attack vector that gives attackers access to private information such as login credentials and credit card numbers. In 2017, Indonesia ranked 9th in the number of phishing attacks, one phishing incident per 2,380 emails. The latest F5 report entitled, fraud in October, November and December increased by 50% from the annual average. Pretending to be someone or a famous entity is the main tactic. As many as 71% of phishing attacks in the period 1 September - 31 October 2018 use the mode claimed to be from a well-known company, especially in the technology industry.Keywords: network, internet, intelligents systems, website phishing, attack.


2021 ◽  
Vol 11 (16) ◽  
pp. 7738
Author(s):  
Kyounggon Kim ◽  
Faisal Abdulaziz Alfouzan ◽  
Huykang Kim

Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-attacks is gradually changing. Early cyber-attacks were usually conducted by curious personal hackers who used simple techniques to hack homepages and steal personal information. Lately, cyber attackers have started using sophisticated cyber-attack techniques that enable them to retrieve national confidential information beyond the theft of personal information or defacing websites. These sophisticated and advanced cyber-attacks can disrupt the critical infrastructures of a nation. Much research regarding cyber-attacks has been conducted; however, there has been a lack of research related to measuring cyber-attacks from the perspective of offensive cybersecurity. This motivated us to propose a methodology for quantifying cyber-attacks such that they are measurable rather than abstract. For this purpose, we identified each element of offensive cybersecurity used in cyber-attacks. We also investigated the extent to which the detailed techniques identified in the offensive cyber-security framework were used, by analyzing cyber-attacks. Based on these investigations, the complexity and intensity of cyber-attacks can be measured and quantified. We evaluated advanced persistent threats (APT) and fileless cyber-attacks that occurred between 2010 and 2020 based on the methodology we developed. Based on our research methodology, we expect that researchers will be able to measure future cyber-attacks.


2011 ◽  
pp. 699-717
Author(s):  
James G. Williams ◽  
Wichian Premchaiswadi

As the volume of purchases for products and services on the Internet has increased and the chosen method of payment is a credit or debit card, e-commerce merchants must be capable of accepting such payment methods. Unfortunately, cyber-criminals have found ways to steal personal information found on credit cards and debit cards and fraudulently use this information to purchase products and services which costs merchants lost revenue and fees for chargebacks. This article discusses the process by which credit card payments are processed beginning with the e-commerce merchant’s web site to a credit card processor or service gateway to the credit card company’s network to the issuing bank’s network with an accept or decline response being returned to the merchant’s shopping cart system via the same networks. The article addresses the issue of credit card fraud in terms of how the cyber-criminals function and the potential solutions used to deter these attempts by the cybercriminals. A list of preventive measures that should be used by e-commerce merchants is provided.


Author(s):  
Ming Wang

The enormous amount of commercial information available on the Internet makes online shoppers overwhelmed and it difficult to find relevant information. The recent development of shopping agents (bots) has offered a practical solution for this information overload problem. From the customer’s point of view, a shopping agent reduces search complexity, increases search efficiency, and supports user mobility. It has been proposed that the availability of agent Web sites is one of the reasons why e-markets should be more efficient (Mougayar, 1998). Shopping bots are created with agent software that assists online shoppers by automatically gathering shopping information from the Internet. In this comparative shopping environment, shopping agents can provide the customer with comparative prices for a searched product, customer reviews of the product, and reviews of the corresponding merchants. The agent will first locate the merchants’ Web sites selling the searched product. Then, the agent will collect information about the prices of the product and its features from these merchants. Once a customer selects a product with a merchant, the individual merchant Web site will process the purchase order and the delivery details. The shopping agent receives a commission on each sale made by a visitor to its site from the merchant selling the product on the Internet. Some auction agent Web sites provide a negotiation service through intelligent agent functions. Agents will represent both buyers and sellers. Once a buyer identifies a seller, the agent can negotiate the transaction. The agents will negotiate a price and then execute the transaction for their respective owners. The buyer’s agent will use a credit card account number to pay for the product. The seller’s agent will accept the payment and transmit the proper instructions to deliver the item under the terms agreed upon by the agent.


Author(s):  
Bhuvana ◽  
Arundhathi S Bhat ◽  
Thirtha Shetty ◽  
Mr. Pradeep Naik

Now-a-days internet has become a very unsafe space to deal with. Hackers are constantly trying to gain the user's personal information, and detailed credentials. So many websites on the internet, even though safe, this safety cannot be assured by all websites. These rule breakers avoid abiding by rules, and try to employ methods like trickery and hacking to gain illegal access to private information. T o be able to overcome this problem, we need to first understand the intricacies of how the virus is designed. This paper mainly deals with the different phishing techniques and recent phishing attacks that took place during COVID 19. like Link Manipulation, Filter Evasion, Website Forgery, Phone Phishing and Website Forgery. We have also studied a subtle method to perform phishing attacks that makes links appear legitimate, but actually redirect a victim to an attacker's website called Convert Redirect. In this paper , we present some phishing examples like Paypal phishing which involves sending an email that fraudulently claims to be from a well known company and Rapidshare Phishing where in the spoofed web page, phishers attempt to confuse their victims just enough to entice them to enter their login name and password. To perform these types of phishing the Phishers uses so many phishing techniques like Link Manipulation, Filter Evasion, Website Forgery, Phone Phishing and Website Forgery. Phishing techniques include the domain of email messages. Phishing emails have hosted such a phishing website, where a click on the URL or the malware code as executing some actions to perform is socially engineered messages. Lexically analyzing the URLs can enhance the performance and help to differentiate between the original email and the phishing URL. As assessed in this study , in addition to textual analysis of phishing URL, email classification is successful and results in a highly precise anti phishing. From the thorough analysis of the research paper, we have understood how phishing attacks work and the different methods employed to carry out the attack. Also, we have studied some of the most recent phishing attacks and measures taken by the authorities to overcome and prevent any such attacks in future.


Author(s):  
Michael Middleton

In recent times, the popularity of the Internet has led to e-government practices being widely recognized as an important option for service to the general public. In response, various tiers of government from national to local level have sought opportunities to engage the public through Web sites. Many governments now provide some level of access to government through Web interfaces, for example, through access to resources such as publications and government data. In some cases there are services provided that may be executed online. For example, users may provide personal information for licensing or to undertake payments. There continues to be a diversity of implementation quality and levels for such services. The facilitation of e-government has been characterized in various ways. For example, the European Union has seen it in terms of four main tasks: the development of Internet-based services to improve access to public information and services, the improvement of the transparency of public administration by using the Internet, the full exploitation of information technology within public administration, and the establishment of e-procurement (Strejcek & Theilb, 2003). More recently, the United Nations (UN), noting that ICTs may be used to transform its internal and external relationships, has also identified four similar but distinct areas: internal processes such as record keeping, electronic service delivery, virtual communities for digital democracy, and e-business opportunities such as procurement (United Nations Department of Economic and Social Affairs, 2005).


2013 ◽  
Vol 479-480 ◽  
pp. 916-922
Author(s):  
Chuan Sheng Wang ◽  
Fu Hau Hsu ◽  
Shih Jen Chen ◽  
Yan Ling Hwang ◽  
Min Hao Wu

Phishing is the malicious behavior of stealing personal information from computer users. It is a very popular account-theft-method among cyber criminals. Hence, developing a new approach to solve phishing attacks becomes an important issue. This paper proposes a router-based solution, called Shark, to phishing attacks. The router-based property allows Shark to protect a whole network without the need to install or maintain any software in any internal host. Based on the URLs collected from emails and the properties of the web pages pointed by these URLs, Shark quickly and automatically identifies phishing web pages. Experimental results demonstrate that Shark installed on a Linux edge router can accurately detect and attack phishing sites with low false positives and false negatives. And even though a false positive occurs, erroneous counterattacks do not influence the normal operations of legal web sites.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

The more sophisticated the technology, the higher the level of criminal activity. Before there was digital data, the world only had physical threats. However, the emergence of the internet and the global network creates cybercrime everywhere. The emergence of this crime is because many companies or organizations are involved in the internet network. For example, purchasing with a credit card requires a manual swipe tool, while now the credit card itself can be transacted online. Cyber attack is one of the crimes that can be experienced by anyone, especially with the increasing number of organizations connected to the Internet to make way for hackers to be able to work on an organization. Large developing markets are not spared from the cybercriminals. The higher their role in the global supply chain increases their attractiveness to attack through cyberspace. Attackers will use it if their site's security management is weak. Cybercrime is too easy to do. Many technology users are failing to perform the most basic protection measures. Many companies only think about their economic circulation without having adequate defense products, while cybercriminals use sophisticated and straightforward technology to identify targets, automate the creation and delivery of software, and easy monetization of what they steal. Cybercrime affects technology and finances a lot in the present. Many individuals, companies or banks suffer huge losses. Cybercrime can be anticipated by increasing security in the corporate network when communicating to the outside world.


Sign in / Sign up

Export Citation Format

Share Document