scholarly journals INTELLIGENT PHISHING WEBSITE DETECTION AND PREVENTION SYSTEM BY USING LINK GUARD ALGORITHM

Author(s):  
M. MADHURI ◽  
K. YESESWINI ◽  
U. VIDYA SAGAR

Phishing is a new type of network attack where the attacker creates a replica of an existing Web page to fool users (e.g., by using specially designed e-mails or instant messages) into submitting personal, financial, or password data to what they think is their service provides’ Web site. In this project, we proposed a new end-host based anti-phishing algorithm, which we call Link Guard, by utilizing the generic characteristics of the hyperlinks in phishing attacks. These characteristics are derived by analyzing the phishing data archive provided by the Anti-Phishing Working Group (APWG). Because it is based on the generic characteristics of phishing attacks, Link Guard can detect not only known but also unknown phishing attacks. We have implemented LinkGuard in Windows XP. Our experiments verified that LinkGuard is effective to detect and prevent both known and unknown phishing attacks with minimal false negatives. LinkGuard successfully detects 195 out of the 203 phishing attacks. Our experiments also showed that LinkGuard is light weighted and can detect and prevent phishing attacks in real time. Index

10.29173/iq91 ◽  
2001 ◽  
Vol 25 (3) ◽  
pp. 13
Author(s):  
Yvette Hackett

A National Research Data Management Strategy for Canada: The Work of the National Data Archive Consultation Working Group


Author(s):  
Lech J. Janczewski ◽  
Andrew M. Colarik

The mass use of the Internet as a trade and distribution tool has become the source of a new type of attack—the defacement of Web page content. Due to the nature of this activity, it is frequently referred to as Web graffiti. Indeed, there is a lot of commonality between real graffiti sprayed on walls and fences and its computer-based Web counterpart.


2007 ◽  
Vol 3 (T26B) ◽  
pp. 131-132
Author(s):  
Walter F. Huebner ◽  
Alberto Cellino ◽  
Edward F. Tedesco ◽  
Dominique Bockelee-Morvan ◽  
Yuehua Ma ◽  
...  

The meeting of the Physical Properties of the Minor Planets Working Group of IAU Commission 15 took place on 24 August, and was devoted to purely scientific matters, since other topics (organization of the Minor Planet WG, need of a new web page, election of the new chairman) had been already discussed during the business meeting of Commission 15, on 22 August. A brief summary of the talks given during the meeting is given in what follows.


2014 ◽  
Vol 644-650 ◽  
pp. 2755-2758
Author(s):  
Li Zhao ◽  
Xiang Ling ◽  
Feng Deng

Webpage tampering prevention system is a security protection means of website to prevent from hacker’s unauthorized update to webpage. This paper deeply researches the key technology of webpage tampering prevention system, i.e., poll tampering detection technology, core embedding technology and file filtering drive technology, the algorithm of three prevailing tampering prevention detection technologies is realized on the basis of apache platform, they are integrated together to form an exclusive and perfect new type tampering prevention system.


2005 ◽  
Vol 19 (2) ◽  
pp. 173-179 ◽  
Author(s):  
Sabine Wilhelm ◽  
Gail Steketee ◽  
Noreen A. Reilly-Harrington ◽  
Thilo Deckersbach ◽  
Ulrike Buhlmann ◽  
...  

This study examined the effectiveness of a new type of purely Beckian cognitive treatment for Obsessive-Compulsive Disorder (OCD). The manualized treatment used a flexible format permitting therapists to choose among several modules developed to address specific OCD belief domains identified by the Obsessive-Compulsive Cognition Working Group (1997). Fifteen participants diagnosed with OCD were treated individually for 14 weekly sessions. Ten participants had never received behavior therapy, and 5 participants had failed to benefit from exposure and response prevention (ERP) in the past. Participants improved with respect to their depressive and obsessive-compulsive symptoms over the course of the treatment. However, those who had never received ERP improved more than those who had failed to benefit from prior ERP. Implications of the study are discussed.


2012 ◽  
Vol 195-196 ◽  
pp. 927-932
Author(s):  
Mian Rong Yang ◽  
Xin Zhang

This paper presents a system architecture through a new type of strategy for web-page tamper-resistant. The new strategy emphasizes the following points: by using of file filter technology timely find out and block the malicious tampering so that the illegal malicious tampering is prevented; the tamper-resistant module and digital watermark module are distributed in two different servers and the servers are separated by a firewall to strengthen the overall security of the system; to ensure the security of the tamper-resistant process, it is necessary to deployment a single chip machine to protect the tamper-resistant process.


Author(s):  
Bhuvana ◽  
Arundhathi S Bhat ◽  
Thirtha Shetty ◽  
Mr. Pradeep Naik

Now-a-days internet has become a very unsafe space to deal with. Hackers are constantly trying to gain the user's personal information, and detailed credentials. So many websites on the internet, even though safe, this safety cannot be assured by all websites. These rule breakers avoid abiding by rules, and try to employ methods like trickery and hacking to gain illegal access to private information. T o be able to overcome this problem, we need to first understand the intricacies of how the virus is designed. This paper mainly deals with the different phishing techniques and recent phishing attacks that took place during COVID 19. like Link Manipulation, Filter Evasion, Website Forgery, Phone Phishing and Website Forgery. We have also studied a subtle method to perform phishing attacks that makes links appear legitimate, but actually redirect a victim to an attacker's website called Convert Redirect. In this paper , we present some phishing examples like Paypal phishing which involves sending an email that fraudulently claims to be from a well known company and Rapidshare Phishing where in the spoofed web page, phishers attempt to confuse their victims just enough to entice them to enter their login name and password. To perform these types of phishing the Phishers uses so many phishing techniques like Link Manipulation, Filter Evasion, Website Forgery, Phone Phishing and Website Forgery. Phishing techniques include the domain of email messages. Phishing emails have hosted such a phishing website, where a click on the URL or the malware code as executing some actions to perform is socially engineered messages. Lexically analyzing the URLs can enhance the performance and help to differentiate between the original email and the phishing URL. As assessed in this study , in addition to textual analysis of phishing URL, email classification is successful and results in a highly precise anti phishing. From the thorough analysis of the research paper, we have understood how phishing attacks work and the different methods employed to carry out the attack. Also, we have studied some of the most recent phishing attacks and measures taken by the authorities to overcome and prevent any such attacks in future.


2021 ◽  
Vol 6 (3) ◽  
Author(s):  
Elizabeth A Amusan ◽  
Oluyinka T Adedeji ◽  
Oluwaseun Alade ◽  
Funmilola A Ajala ◽  
Kayode O Ibidapo

Phishing is a type of cyber-attack where the attacker deploys a combination of social engineering and technological skills to trick users into revealing private information like bank account details, usernames and passwords by creating an imitation of an existing web page. This research developed an Android-based anti-phishing system leveraging on the ubiquity of mobile devices and their increasing applications for business and personal purposes. The system was developed by implementing an end-host based algorithm called the Linkguard algorithm which is effective in detecting and preventing both known and unknown phishing attacks. A total of over 500 links which was a blend of both phishing and non-phishing links were collected from Phishtank and Alexa to validate the proposed system which achieved an accuracy of 96%. It is recommended that concerted efforts should be geared towards continuously sensitizing users to improve their phishing awareness as this cybercrime keeps evolving and users play a very crucial role in mitigating it. Keywords— android, cybercrime, Linkguard algorithm, mobile, phishing 


Sign in / Sign up

Export Citation Format

Share Document