Review of Various Methods for Phishing Detection

Journal Title: EAI Endorsed Transactions on Energy Web - Year 2018, Vol 5, Issue 20

Abstract

In this modern world where the technology has spread rapidly and the inception of cell phones, computers and also the rate at which internet is being used has increased in all fields both commercial, financial and also individuals. The above said inception is a boon but the users are facing dangerous challenges. Hence phishing and information pilfering which are done through spams and deceptive emails. This kind of spams and deceptive emails could lead to great losses for institutions like financial and similar ones. It is understood that in the beginning it is very difficult to judge or trace the modesoprandi of these hackers. To ascertain this cryptic methods of phishing attacks can be effectively done only by developing a particular software thereby safe guard the users. To pick out and detect the operation methods of hackers, the researcher uses the Data Mining process where a number of datamining tools, which analysis the data are used. This learning, basically is Data Miming process and the informations are taken out through different outlets and sources.

Authors and Affiliations

R. Sakunthala jenni, S. Shankar

Keywords

Related Articles

Determination of Awareness of Piracy Level on Educational Institutions- A Questionnaire Based Study

Software piracy is globally a major issue of using software without proper permission as enforced by the software license and agreement. Currently, software industries and organizations face a huge loss of money due to s...

Wi-Fi Hotspot Auto-Discovery: A Practical & Energy-Aware System for Smart Objects using Cellular Signals

The Internet of Things (IoT) paradigm aims to interconnect a variety of heterogeneous Smart Objects (SO) using energy-efficient methodologies and standard communication protocols. A majority of consumer devices sold toda...

A New GPS-based Digital Protection System for Smart Grids in Loop Structure

This paper presents a new digital protection system to solve the protection challenges in future smart grids, i.e., fast protection and fault isolation in a loop-structured system with limited magnitude of fault current....

A Review On Automatic Detection of Brain Tumor Using Computer Aided Diagnosis System Through MRI

In diagnosing brain tumor using Magnetic Resonance Imaging (MRI) plays a major role in complicated stages. To extract the images, it uses a kind of nuclear magnetic resonance technique. To identify the exact region where...

Stabilization of Electrical Parameters of Machine-Converter Voltage Source

The paper is devoted to development of Machine-Converter Source (MCS), which forms the output voltage waveform of electric generator as sum of EMFs with near frequencies. As electric modulation generator is used a synchr...

Download PDF file
  • EP ID EP45406
  • DOI http://dx.doi.org/10.4108/eai.12-9-2018.155746
  • Views 252
  • Downloads 0

How To Cite

R. Sakunthala jenni, S. Shankar (2018). Review of Various Methods for Phishing Detection. EAI Endorsed Transactions on Energy Web, 5(20), -. https://europub.co.uk/articles/-A-45406