A Secured Methodology for Anti-Phishing

被引:0
|
作者
Churi, Tanvi [1 ]
Sawardekar, Pranay [1 ]
Pardeshi, Abhijeet [1 ]
Vartak, Pallavi [2 ]
机构
[1] VIVA Inst Technol, Comp, Bombay, Maharashtra, India
[2] VIVA Inst Technol, ME IT, Bombay, Maharashtra, India
关键词
Anti-phishing; code generation; phishing attacks; techniques; security; unique code; shares; visual cryptography;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The technique used to perform on-line robbery/stealing of person credentials is called a phishing in cyber international. It's far affecting all of the foremost sectors of enterprise each day with lots of misuse of consumer credentials. To stop phishing many detection and prevention strategies has been made with their very own blessings and drawbacks respectively, but phishing has been eradicated absolutely yet. Seeing the truth that phished pages commonly asks for getting into and submitting the credentials but is not able to retrieved any user acknowledged facts, right here we suggest a preventive anti-phishing technique keep away from to be victims of phishing attacks
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Classification of Anti-phishing Solutions
    Chanti S.
    Chithralekha T.
    SN Computer Science, 2020, 1 (1)
  • [2] Anti-phishing: A comprehensive perspective
    Varshney, Gaurav
    Kumawat, Rahul
    Varadharajan, Vijay
    Tupakula, Uday
    Gupta, Chandranshu
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238
  • [3] Anti-Phishing in Offense and Defense
    Yue, Chuan
    Wang, Haining
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 345 - 354
  • [4] NoPhish: An anti-phishing education app
    Canova, Gamze
    Volkamer, Melanie
    Bergmann, Clemens
    Borza, Roland
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 : 88 - 192
  • [5] NoPhish: An Anti-Phishing Education App
    Canova, Gamze
    Volkamer, Melanie
    Bergmann, Clemens
    Borza, Roland
    SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 188 - 192
  • [6] Some thoughts about anti-phishing
    Jenq, John
    Cheng, Rex
    3RD INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS, AND APPLICAT/4TH INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2006, : 181 - 185
  • [7] Email Anti-Phishing Detection Application
    Helmi, Rabab Alayham Abbas
    Ren, Chua Shang
    Jamal, Arshad
    Abdullah, Muhammad Irsyad
    2019 IEEE 9TH INTERNATIONAL CONFERENCE ON SYSTEM ENGINEERING AND TECHNOLOGY (ICSET), 2019, : 264 - 267
  • [8] Anti-Phishing Awareness Delivery Methods
    Darem, Abdulbasit
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (06) : 7944 - 7949
  • [9] A framework for assessment of anti-phishing preparedness
    Leung, Alvin Chung Man
    Bose, Indranil
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1020 - +
  • [10] Analysis and improvement of anti-phishing schemes
    Florencio, Dinei
    Herley, Cormac
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 148 - +