Email Anti-Phishing Detection Application

被引:2
|
作者
Helmi, Rabab Alayham Abbas [1 ]
Ren, Chua Shang [1 ]
Jamal, Arshad [1 ]
Abdullah, Muhammad Irsyad [1 ]
机构
[1] Management & Sci Univ, Fac Informat Sci & Engn, Shah Alam, Malaysia
关键词
phishing; phishing detection; email phishing; information security;
D O I
10.1109/icsengt.2019.8906316
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing is one of many computer security attacks, in which the attacker tries to trick people into fake website that is masqueraded to look and feel like the authentic website, thus prompting the victim to share sensitive information or install hidden malware on their computers. Phishing known as method which stealing personal and financial data that convince people to participate on unwittingly money laundering. Phishing link dispersing are associate with a number of methods, this paper focuses on e-mail message as a means to send phishing website links, which spoof or mimic, banks, credit card and companies or other e-commerce. The purpose of this research is to design and develop a tool to detect the source code of phishing website which attached to email by using decision tree algorithm. In order to improve the protection of users' information from the fake website. Anti-phishing detection is suggested to overcome the problems through the following features. The first feature of anti-phishing detection login system by using user's email and password. Second feature detect phishing website which attached on user's email by using decision tree algorithm. Lastly, on phishing website will be detected and generate a report to the user. The system testing shows high reliability and the users' feedback shows ease of use as well as learning..
引用
收藏
页码:264 / 267
页数:4
相关论文
共 50 条
  • [21] Usability evaluation of anti-phishing toolbars
    Li, Linfeng
    Helenius, Marko
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (02): : 163 - 184
  • [22] Mobile anti-phishing: Approaches and challenges
    Shahriar, Hossain
    Zhang, Chi
    Dunn, Stephen
    Bronte, Robert
    Sahlan, Atef
    Tarmissi, Khaled
    [J]. INFORMATION SECURITY JOURNAL, 2019, 28 (06): : 178 - 193
  • [23] A Honeypots Based Anti-Phishing Framework
    Chauhan, Shubhika
    Shiwani, Savita
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 618 - 625
  • [24] Visual security is feeble for Anti-Phishing
    Leung, Chun-Ming
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 118 - 123
  • [25] NoPhish: An anti-phishing education app
    Technische Universität Darmstadt, Germany
    [J]. Lect. Notes Comput. Sci, (188-192):
  • [26] Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
    Gupta, Srishti
    Kumaraguru, Ponnurangam
    [J]. PROCEEDINGS OF THE 2014 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 2014,
  • [27] AntiPhiMBS: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Application Level
    Thakur, Tej Narayan
    Yoshiura, Noriaki
    [J]. INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2021, 2021, 12672 : 399 - 412
  • [28] A Study of Anti-phishing Strategies Based on TRIZ
    Qi, Ming
    Zou, Chang-Yi
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 536 - 538
  • [29] A Novel Anti-phishing Effectiveness Evaluator Model
    Sankhwar, Shweta
    Pandey, Dhirendra
    Khan, R. A.
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 610 - 618
  • [30] An Evaluation of Users' Anti-Phishing Knowledge Retention
    Alnajim, Abdullah
    Munro, Malcolm
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 210 - 214