A rule based approach for detecting Phishing attacks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
Phishing attacks are one of the emerging serious threats against personal data security. These attacks are often performed by sending out emails that seem to originate from a trusted party. The objective is to deceive the recipient to release sensitive information such as usernames, passwords, banking details, or credentials. The aim of phishing is to steal a user’s identity in order to make fraudulent transactions as if the Phisher were the user.Though a large number of methods have been proposed and implemented for detecting Phishing attacks, a complete solution is missing. A great amount of research is being carried out to solve this problem using rule based method, browser based method and machine learning approaches but still there are insufficient methods that can be used against Phisher’s novel attacks which they are able change time to time.In this Dissertation entitled “A RULE BASED APPROACH FOR DETECTING PHISHING ATTACKS”, a solution is proposed for organization wide solution; rule set has been proposed for this system to filter out phishing mails at the perimeter of the organization. A balanced rule set has been used to keep false positive and false negative low.
Authors and Affiliations
Vivek Shukla, Mahendra Kumar Rai
Spontaneous Wireless ADHOC Network Creation, To Enhance Authentication Based On Self Configure Secure Protocol
The proposal paper presents a self configured secure protocol for spontaneous wireless Adhoc networks which uses hybrid symmetric/ asymmetric scheme for encryption of the data. My proposal is to create a Spontaneous net...
Light Weight Access Control System for Constrained IOT Devices
This paper presents a low cost and flexib le home control and monitoring system using an embedded micro-web server, with IP connectivity for accessing and controlling devices and appliances remotely using Android based...
Feasibility Study on Flexible Building (G+2)
A good design teaching environment requires good utilization of all the space available which can move very often be improved and made some flexible by the incorporation of some type of movable partition wall, day by da...
Excess Gibbs Energy and Saturation Pressure of the Environmentally Friendly Refrigerant Mixture: R365mfc and R152a
This work presents the saturation pressure of new environmentally friendly refrigerants 1,1-difluoroethane (R152a) and 1,1,1,3,3-Pentafluorbutane (R365mfc), beside their mixture. Special attention was given to enable a...
A Review on Hardware Implementation for Reduction of Artifacts in Bio-Medical (ECG) Signal by Using Digital FIR-IIR Filter
ECG signal is of nature of time varying that is most common source used for the diagnosis purpose and observation and analysis of heart diseases present in the patient. ECG is recorded by placing electrodes at specified...