Review of Various Methods for Phishing Detection

Journal Title: EAI Endorsed Transactions on Energy Web - Year 2018, Vol 5, Issue 20

Abstract

In this modern world where the technology has spread rapidly and the inception of cell phones, computers and also the rate at which internet is being used has increased in all fields both commercial, financial and also individuals. The above said inception is a boon but the users are facing dangerous challenges. Hence phishing and information pilfering which are done through spams and deceptive emails. This kind of spams and deceptive emails could lead to great losses for institutions like financial and similar ones. It is understood that in the beginning it is very difficult to judge or trace the modesoprandi of these hackers. To ascertain this cryptic methods of phishing attacks can be effectively done only by developing a particular software thereby safe guard the users. To pick out and detect the operation methods of hackers, the researcher uses the Data Mining process where a number of datamining tools, which analysis the data are used. This learning, basically is Data Miming process and the informations are taken out through different outlets and sources.

Authors and Affiliations

R. Sakunthala jenni, S. Shankar

Keywords

Related Articles

Low Energy Clustering in BAN Based on Fuzzy Simulated Evolutionary Computation

A low energy clustering method of body area networks based on fuzzy simulated evolutionary computation is proposed in this paper. To reduce communication energy consumption, we also designed a fuzzy controller to dynamic...

Extracting Academic Subjects Semantic Relations Using Collocations

The paper presents approach to analyze semantic content of academic subjects and its internal relations using statistically-based techniques for collocation extraction from large electronic educational text corpus. It off...

Design and Simulation of Stand-alone PV System for Electronic and Communications Engineering Department Laboratories in Al-Nahrain University

In Iraq the problem of electricity shutdown in the main supply is still exists and the cuts may last for hours. This shutdown causes problems in lectures and students experiments in the colleges because all electrical de...

Frontier and Semifrontier Sets in Intuitionistic Topological Spaces

The notions of frontier and semifrontier in intuitionistic topology have been studied and several of their properties are proved. Many counter examples have been pointed out for the relevant classifications.

Intelligent Control Algorithms in Power Industry

Nowadays more and more attention is given to energy development problems. Modern ways of producing energy are bounded by planet’s resources of coal, natural gas and petroleum, and harmful effects of waste produced by ene...

Download PDF file
  • EP ID EP45406
  • DOI http://dx.doi.org/10.4108/eai.12-9-2018.155746
  • Views 238
  • Downloads 0

How To Cite

R. Sakunthala jenni, S. Shankar (2018). Review of Various Methods for Phishing Detection. EAI Endorsed Transactions on Energy Web, 5(20), -. https://europub.co.uk/articles/-A-45406