Review of Various Methods for Phishing Detection

Journal Title: EAI Endorsed Transactions on Energy Web - Year 2018, Vol 5, Issue 20

Abstract

In this modern world where the technology has spread rapidly and the inception of cell phones, computers and also the rate at which internet is being used has increased in all fields both commercial, financial and also individuals. The above said inception is a boon but the users are facing dangerous challenges. Hence phishing and information pilfering which are done through spams and deceptive emails. This kind of spams and deceptive emails could lead to great losses for institutions like financial and similar ones. It is understood that in the beginning it is very difficult to judge or trace the modesoprandi of these hackers. To ascertain this cryptic methods of phishing attacks can be effectively done only by developing a particular software thereby safe guard the users. To pick out and detect the operation methods of hackers, the researcher uses the Data Mining process where a number of datamining tools, which analysis the data are used. This learning, basically is Data Miming process and the informations are taken out through different outlets and sources.

Authors and Affiliations

R. Sakunthala jenni, S. Shankar

Keywords

Related Articles

EDUCATION QUALITY EVALUATION OF ELECTRIC POWER ENGINEERING SPECIALTIES STUDENTS IN TECHNICAL UNIVERSITY OF RUSSIA WITH THE USE OF INTERNET TECHNOLOGIES

A fuzzy model for the education quality evaluation of electric power engineering specialties students with the use of modern Internet technologies is described, which allows to take into account the different compatibili...

Model to estimate the salt and pepper noise density level on gray-scale digital image

In this research paper, we proposed a probabilistic analysis to find the relationship between entropy of image and salt & pepper noise density. For this estimation, we have employed entropy inspection of spatial domain te...

Review of Various Methods for Phishing Detection

In this modern world where the technology has spread rapidly and the inception of cell phones, computers and also the rate at which internet is being used has increased in all fields both commercial, financial and also i...

Demand Response an Alternative Solution to Prevent Load Shedding Triggering

This paper investigates an alternative solution to prevent Load Shedding (LS) triggering during underfrequency and proposes a new technique to restore the frequency during emergency events. Demand response (DR) is consid...

Comparative Analysis of Machine Learning Algorithms on IVR data

We aim to classify IVR data (Interactive Voice Response) and provide a detailed summary of the methods and techniques we employed to create a classifier model of reasonably high accuracy. This model is built to process l...

Download PDF file
  • EP ID EP45406
  • DOI http://dx.doi.org/10.4108/eai.12-9-2018.155746
  • Views 246
  • Downloads 0

How To Cite

R. Sakunthala jenni, S. Shankar (2018). Review of Various Methods for Phishing Detection. EAI Endorsed Transactions on Energy Web, 5(20), -. https://europub.co.uk/articles/-A-45406