Email Anti-Phishing Detection Application

被引:2
|
作者
Helmi, Rabab Alayham Abbas [1 ]
Ren, Chua Shang [1 ]
Jamal, Arshad [1 ]
Abdullah, Muhammad Irsyad [1 ]
机构
[1] Management & Sci Univ, Fac Informat Sci & Engn, Shah Alam, Malaysia
关键词
phishing; phishing detection; email phishing; information security;
D O I
10.1109/icsengt.2019.8906316
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing is one of many computer security attacks, in which the attacker tries to trick people into fake website that is masqueraded to look and feel like the authentic website, thus prompting the victim to share sensitive information or install hidden malware on their computers. Phishing known as method which stealing personal and financial data that convince people to participate on unwittingly money laundering. Phishing link dispersing are associate with a number of methods, this paper focuses on e-mail message as a means to send phishing website links, which spoof or mimic, banks, credit card and companies or other e-commerce. The purpose of this research is to design and develop a tool to detect the source code of phishing website which attached to email by using decision tree algorithm. In order to improve the protection of users' information from the fake website. Anti-phishing detection is suggested to overcome the problems through the following features. The first feature of anti-phishing detection login system by using user's email and password. Second feature detect phishing website which attached on user's email by using decision tree algorithm. Lastly, on phishing website will be detected and generate a report to the user. The system testing shows high reliability and the users' feedback shows ease of use as well as learning..
引用
收藏
页码:264 / 267
页数:4
相关论文
共 50 条
  • [31] A Study of Anti-phishing Strategies Based on TRIZ
    Qi, Ming
    Zou, Chang-Yi
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 536 - 538
  • [32] A new approach creating an anti-phishing seal
    Luca, Daniel L.
    [J]. 5th RoEduNet IEEE International Conference, Proceedings, 2006, : 110 - 112
  • [33] A Novel Anti-phishing Effectiveness Evaluator Model
    Sankhwar, Shweta
    Pandey, Dhirendra
    Khan, R. A.
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 610 - 618
  • [34] Email Embeddings for Phishing Detection
    Gutierrez, Luis Felipe
    Abri, Faranak
    Armstrong, Miriam
    Namin, Akbar Siami
    Jones, Keith S.
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2087 - 2092
  • [35] Model for Analysing Anti-Phishing Authentication Ceremonies
    Hatunic-Webster, Edina
    Mtenzi, Fred
    O'Shea, Brendan
    [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 144 - 150
  • [36] SPP: An anti-phishing single password protocol
    Gouda, Mohamed G.
    Liu, Alex X.
    Leung, Lok M.
    Alam, Mohamed A.
    [J]. COMPUTER NETWORKS, 2007, 51 (13) : 3715 - 3726
  • [37] Website Risk Assessment System for Anti-Phishing
    Kim, Young-Gab
    Cha, Sungdeok
    [J]. FUTURE INFORMATION TECHNOLOGY, PT II, 2011, 185 : 131 - 138
  • [38] Identifying an OpenID anti-phishing scheme for cyberspace
    Abbas, Haider
    Mahmoodzadeh, Moeen Qaemi
    Khan, Farrukh Aslam
    Pasha, Maruf
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 481 - 491
  • [39] Interface Design Elements for Anti-phishing Systems
    Chen, Yan
    Zahedi, Fatemeh
    Abbasi, Ahmed
    [J]. SERVICE-ORIENTED PERSPECTIVES IN DESIGN SCIENCE RESEARCH: 6TH INTERNATIONAL CONFERENCE, 2011, 6629 : 253 - 265
  • [40] Emergent Challenges and IPDS for Anti-Phishing Attack
    Li Bing
    Sun Ruifeng
    Fang Xin
    Luo Xue
    Chang Wei-hao
    [J]. 2014 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2014,