Review of Various Methods for Phishing Detection

Authors

  • R. Sakunthala jenni Hindusthan College of Engineering and Technology'
  • S. Shankar Hindusthan College of Engineering and Technology

DOI:

https://doi.org/10.4108/eai.12-9-2018.155746

Keywords:

phishing, anti-phishing, hackers, fraud websites, legitimate websites

Abstract

In this modern world where the technology has spread rapidly and the inception of cell phones, computers and also the rate at which internet is being used has increased in all fields both commercial, financial and also individuals. The above said inception is a boon but the users are facing dangerous challenges. Hence phishing and information pilfering which are done through spams and deceptive emails. This kind of spams and deceptive emails could lead to great losses for institutions like financial and similar ones. It is understood that in the beginning it is very difficult to judge or trace the modesoprandi of these hackers. To ascertain this cryptic methods of phishing attacks can be effectively done only by developing a particular software thereby safe guard the users. To pick out and detect the operation methods of hackers, the researcher uses the Data Mining process where a number of datamining tools, which analysis the data are used. This learning, basically is Data Miming process and the informations are taken out through different outlets and sources.

Downloads

Download data is not yet available.

Downloads

Published

12-09-2018

How to Cite

1.
jenni RS, Shankar S. Review of Various Methods for Phishing Detection. EAI Endorsed Trans Energy Web [Internet]. 2018 Sep. 12 [cited 2024 Nov. 22];5(20):e16. Available from: https://publications.eai.eu/index.php/ew/article/view/968