Preview

Phishing Website Detection System

Satisfactory Essays
Open Document
Open Document
321 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Phishing Website Detection System
Abstract: To mimic web pages of real websites, phishing websites are created by malicious people. Some of the Web pages look like the original websites. To analyze and to understand phishing website is a very complicate and complex issue and it is both technical and social problem .The aim of this report is to create a flexible and effective method that uses fuzzy logic. To check whether phishing activity is taking place or not, fuzzy logic is used on websites to qualify all phishing website characteristics. Fuzzy logic modeling is applied in this approach to assess the phishing website risk on the 27 characteristics and it is also applied on the factors which stamp the forged website.
The FL model which is proposed depends on operators which is used to characterize the Website phishing factors and indicators as fuzzy variables and produces six measures and criteria of the phishing website attack size with a layer structure. The results show the significance and importance of (URL and Domain Identity) phishing site criteria, which is represented by one layer, and have an effect on the different layer of the phishing feature.

Reference:
1. Retrieved on Dec 25 from www.wholesecurity.com.
2. Retrieved on Dec 26 from http://ieeexplore.ieee.org/xpl/freeabs_all.jsp.
3. Retrieved on Dec 26 from http://portal.acm.org/citation.cfm.
4. Retrieved on Dec 27 from http://antiphishing.org/reports/apwg_report_DEC2005_FINAL.pdf
5. Retrieved on Dec 28 from http://en.wikipedia.org/wiki/Anti-phishing_software.
6. Retrieved on Dec 29 from S. Shah, “Measuring Operational Risks using Fuzzy Logic Modeling, “Article, Towers Perrin, July 2003.
7. Retrieved on Dec 30 from T. Sharif, “Phishing Filter in IE7,” http://blogs.msdn.com/ie/archive/2005/09/09/463204.aspx, September 9, 2006.
8. Retrieved on Dec 30 from http://en.wikipedia.org/wiki/Defuzzification.
9. Retrieved on Dec 30 from

You May Also Find These Documents Helpful

  • Satisfactory Essays

    M6 Assignment

    • 387 Words
    • 2 Pages

    Online look up of phishing sites – which is a maintained list of phishing sites updated several times an hour.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The <System Name> risk assessment was conducted in accordance with the methodology described in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-30, Risk Management Guide for Information Technology Systems. The methodology used to conduct this risk assessment is qualitative, and no attempt was made to determine any annual loss expectancies, asset…

    • 5647 Words
    • 25 Pages
    Powerful Essays
  • Powerful Essays

    Quantitative Risk Analysis is the methodology for numerically breaking down the impact on general venture objectivities of distinguished dangers" (comp. Pmbok3, p. 237). On the base of the after-effects of the Qualitative Risk Analysis the "Quantitative Risk Analysis is performed on dangers that have been prioritized and analysis’s the impacts of those dangers occasions and assigns a numerical rating to those dangers". As opposed to evaluating the single effects by utilizing a crude typology as a part of the procedure of Quantitative Risk Analysis the effects to the entire undertaking will be made processable and will be processed for creating a more expounded aggregate positioning.…

    • 1477 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISSC363 Assignment 3

    • 586 Words
    • 2 Pages

    References: Bayne, J. (2002). An overview of threat and risk assessment. SANS Institute. Retrieved from http://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76…

    • 586 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    mis 535

    • 2196 Words
    • 8 Pages

    In a typical phishing attack, the attacker puts up a Web site that looks nearly identical to the victim's Web site. Technology changes fast, our genetic code and learned behaviors not so. As security professionals, we must concentrate not on technical measures, but on education, education, education. Phishers often set up the fake sites several days before sending out phishing e-mails. One way to stop them from swindling customers is to find and shut down these phishing sites before phishers launch their e-mail campaigns. Companies can outsource the search to a fraud alert service. These services use technologies that scour the Web looking for unauthorized uses of your logo or newly registered domains that contain your company's name, either of which might be an indication of an impending phishing attack. This will give your company time to counteract the strike Phishing attacks bring with them other risks and costs as well; including the direct IT costs to locate the source of data loss. Organizations should establish a cross-functional anti-phishing team and develop a response plan so that they're ready to deal with any attack. Ideally, the team should include representatives from IT, internal audit, communications, PR, marketing, the Web group, customer service and legal services.…

    • 2196 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Exam Cheat Sheet

    • 1283 Words
    • 6 Pages

    Phishing: Claiming to be a legitimate business in an attempt to trick people into divulging sensitive information by getting them to go to a specified website…

    • 1283 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Waves of targeted email attacks, often called phishing, are exploiting client side vulnerabilities in commonly used programs such as Adobe PDF Quick Time, Adobe Flash, and Microsoft Office. This is currently the primary initial infection vector used to compromise computers that have access to the internet and the network.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011).…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    The original task team at First World Bank Savings and Loan has concerns about the…

    • 849 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Enterprise risk management (ERM) has become a critical practice in organizations that are dedicated to managing uncertainty and its effect on achieving organizational objectives. ERM helps organizations focus on the most relevant risks to achieving an organization’s goals and objectives, both from an operational, as well as a strategic, perspective. How much risk an organization assumes—either knowingly or unwittingly— plays a large part in whether that uncertain future outcome actually improves or worsens the organization’s position. It is therefore crucial for an organization to define and determine its Risk tolerance levels since it will help the organization make major decisions based on what has determined to be acceptable risk.…

    • 1635 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Annotated Bibliography

    • 943 Words
    • 3 Pages

    Facebook has more than five hundred million users and fifty percent are logged on every day, because of this it makes it a large target for online hackers. Many applications on social networking sites can access a user’s personal information. An increasing number of Facebook users are adding “friends” on their Facebook that they do not know and because they accept the friend request, it is not abuse since the friend request was accepted. Spambots send informal messages to users which contain a link which once opened can contain any type of computer virus. Cyber attackers are also using natural disasters as a way to gain credit card information. They will start a group titled “Help Haiti Rebuild” or something similar with a link to insert credit card information to send money to those affected. Some hackers also take part in “phishing” which is a way to gain login names and passwords by presenting a fake login page. an excessive amount of spam was sent by a using account from which the passwords were phished and post a link to the malware.…

    • 943 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Power, Richard, 1999 CSI/FBI Computer Crime and Security Survey, Computer Security Journal, Volume XV, Number 2, 1999, pp. 32.…

    • 2543 Words
    • 11 Pages
    Powerful Essays

Related Topics