Review of Various Methods for Phishing Detection

Journal Title: EAI Endorsed Transactions on Energy Web - Year 2018, Vol 5, Issue 20

Abstract

In this modern world where the technology has spread rapidly and the inception of cell phones, computers and also the rate at which internet is being used has increased in all fields both commercial, financial and also individuals. The above said inception is a boon but the users are facing dangerous challenges. Hence phishing and information pilfering which are done through spams and deceptive emails. This kind of spams and deceptive emails could lead to great losses for institutions like financial and similar ones. It is understood that in the beginning it is very difficult to judge or trace the modesoprandi of these hackers. To ascertain this cryptic methods of phishing attacks can be effectively done only by developing a particular software thereby safe guard the users. To pick out and detect the operation methods of hackers, the researcher uses the Data Mining process where a number of datamining tools, which analysis the data are used. This learning, basically is Data Miming process and the informations are taken out through different outlets and sources.

Authors and Affiliations

R. Sakunthala jenni, S. Shankar

Keywords

Related Articles

Energy Efficiency Led reduced CO2 Emission in Green LTE Networks

The technological advancements in smart phones and their applications have rapidly raised the number of users and their data demands. To fulfil enlarged user’s data requirements, Basestation (BS) engages their resources...

Operational reliability as a resource for increasing the efficiency of electromechanical systems of rope shovels

In work the statistical research of operational reliability of the rope shovels working in the conditions of the Kuznetsk coal basin (Kuzbass) is executed. Indexes of reliability, distribution laws of time per fault and...

A Unified Monitoring Framework for Energy Consumption and Network Traffic

Providing experimenters with deep insight about the effects of their experiments is a central feature of testbeds. In this paper, we describe Kwapi, a framework designed in the context of the Grid'5000 testbed, that unif...

Distributor pricing approaches enabled in Smart Grid to differentiate delivery service quality

Industry practitioners who advocate retail competition and Demand-side Participation now look for approaches to link both initiatives through distributor pricing. As distributors incrementally convert more traditional as...

Optimization of the control loops of the variable frequency induction motor drive of the flame reactor feed screw

In the paper the optimization of the control loops of the variable frequency induction motor drive for the feed screw of a flame reactor has been carried out to obtain required dynamic characteristics of the electric dri...

Download PDF file
  • EP ID EP45406
  • DOI http://dx.doi.org/10.4108/eai.12-9-2018.155746
  • Views 236
  • Downloads 0

How To Cite

R. Sakunthala jenni, S. Shankar (2018). Review of Various Methods for Phishing Detection. EAI Endorsed Transactions on Energy Web, 5(20), -. https://europub.co.uk/articles/-A-45406