International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 23    Submit Your Rating     Cite This   Download        Certificate

A STUDY ON PHISHING AND ANTI PHISHING TECHNIQUES

    2 Author(s):  JUHI GUPTA , RUCHI SINGHAL

Vol -  6, Issue- 3 ,         Page(s) : 49 - 58  (2015 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Phishing is a form of attack in which an attacker fraudulently acquires sensitive information from a victim by impersonating as a trustworthy party. Phishing attacks typically employ generic “lures.” For instance, a phisher may present himself as a large banking corporation or popular online auction site. Phishing attack generally makes use of spoofed emails which asks user to provide sensitive information or content injection techniques in which a message from a legitimate organization actually takes a user to a fake site. Anti Phishing techniques are easy to implement. For any user, being cautious while clicking links and checking links before providing any personal information are some of the simplest methods to avoid any such attack. In this paper anti phishing techniques have been discussed.

  1. Angelo P.E. Rosiello, Engin Kirda Christopher kruegel and Fabrizio Ferrandi.”A Layout Similarity Based Approach For Detecting Phishing Pages”. IEEE Conference on Security and Privacy in Communication Networks, Nice, France, September 2007.
  2. Neil Chou, Robert Ledesma, Yuka Teraguchi, Dan Boneh, and John Mitchell.”Client-side defense against web-based identity theft”.In 11th Annual Network and Distributed System Security Symposium(NDSS’04), San Diego, 2005. 
  3. [APWG] The Anti-phishing Working Group, “Proposed Solutions to Address the Threat of E-mail Spoofing Scams,” December 2003.
  4. Jakobsson, M. Modeling and preventing phishing attacks. In Financial Cryptography (2005).
  5. Jakobsson, M. and Stamm, S. Invasive browser sniffing and countermeasures. In WWW ‘06: Proceedings of the 15th International Conferenceon World Wide Web. ACM Press, NY, 2006, 523–532.
  6. Anti-Phishing Working Group, http://www.antiphishing.org.
  7. Markus Jakobsson, Jacob Ratkiewicz, “Designing Ethical Phishing Experiments: A study of (ROT13) rOnl query features”, Indiana University,USA
  8. Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson and Filippo Menczer, “Social Phishing”, October 2007.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details