Phishing Website Detection

Authors

  • Mr. Tahir Naquash H B  Assistant Professor, Department of Computer Science Engineering, HKBK College of Engineering, Bengaluru, Karnataka, India
  • Sarang Rijul Prakash  Department of Computer Science Engineering, HKBK College of Engineering, Bengaluru, Karnataka, India
  • Mohammed Arshad Usman  Department of Computer Science Engineering, HKBK College of Engineering, Bengaluru, Karnataka, India
  • Mohammed Fahad  Department of Computer Science Engineering, HKBK College of Engineering, Bengaluru, Karnataka, India
  • Mansoor Khan   Department of Computer Science Engineering, HKBK College of Engineering, Bengaluru, Karnataka, India

DOI:

https://doi.org/10.32628/IJSRST2293116

Keywords:

Detection, Phishing email, Filtering, Classifiers, Machine learning, Authentication

Abstract

It is a crime to practice phishing by employing technical tricks and social engineering to exploit the innocence of unaware users. This methodology usually covers up a trustworthy entity so as to influence a consumer to execute an action if asked by the imitated entity. Most of the times, phishing attacks are being noticed by the practiced users but security is a main motive for the basic users as they are not aware of such circumstances. However, some methodologies are limited to look after the phishing attacks only and the delay in detection is mandatory. In this paper we emphasize the various techniques used for the detection of phishing attacks. We have also discovered various techniques for detection and prevention of phishing. Apart from that, we have introduced a new model for detection and prevention of phishing attacks.

References

  1. Gunter Ollmann, “The Phishing Guide Understanding & Preventing Phishing Attacks”, IBMInternet Security Systems, 2007.
  2. T. Churi, P. Sawardekar, A. Pardeshi, and P. Vartak, “A secured methodology for anti- phishing,” Proc. 2017 Int. Conf. Innov. Information, Embed. Commun. Syst. ICIIECS 2017, vol. 2018- Janua, pp. 1–4, 2018, doi: 10.1109/ICIIECS.2017.8276081.
  3. Mahmoud Khonji, Youssef Iraqi, "Phishing Detection: A Literature Survey IEEE, and Andrew Jones, 2013
  4. Modeling and Preventing Phishing Attacks by Markus Jakobsson, Phishing detection system for e-banking using fuzzy data mining by Aburrous, M. Dept. of Comput., Univ. of Bradford, Bradford, UK ; Hossain, M.A. ; Dahal, K. ; Thabatah, F.
  5. Mohammad R., Thabtah F. McCluskey L., (2015) Phishing websites dataset. Available: https://archive.ics.uci.edu/ml/datasets/Phishing+Websites Accessed January 2016
  6. M. V. Kunju, E. Dainel, H. C. Anthony, and S. Bhelwa, “Evaluation of phishing techniques based on machine learning,” 2019 Int. Conf. Intell. Comput. Control Syst. ICCS 2019, no. Iciccs, pp. 963–968.

Downloads

Published

2022-06-30

Issue

Section

Research Articles

How to Cite

[1]
Mr. Tahir Naquash H B, Sarang Rijul Prakash, Mohammed Arshad Usman, Mohammed Fahad, Mansoor Khan "Phishing Website Detection" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 9, Issue 3, pp.791-795, May-June-2022. Available at doi : https://doi.org/10.32628/IJSRST2293116