Abstract
In today’s world, the major security threat is due to Phishing attacks. Phishing attack makes web users believe that they are communicating with a trusted entity for the purpose of stealing account information, login credentials, and identity information in general. This attack method most commonly initiated by sending out e-mails with links to spoofed website that harvest the information. We propose a methodology to detect and prevent the phishing attacks on e-mail. In its more general form it is an end user application that uses hyperlink feature set to detect phishing attacks and digital signature to prevent the attack. Thus our application will act as an interface between a user and its e-mail service provider to provide secure communication. We believe that this will be a better and more cost effective way to prevent people from losing their private information due to phishing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
The Anti-phishing working group, http://www.antiphishing.org/
Williams, A.: Phishing Exposed. Syngress Publishing Inc., (2005)
Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. Technical Report CMU-ISRI-06-112, Institute for Software Research, Carnegie Mellon University (June 2006), http://reports-archive.admcs.cmu.edu/anon/isri2006/abstracts/06-112.html
Chen, J., Guo, C.: Online Detection and Prevention of Phishing Attacks. In: IEEE Communications and Networking, ChinaCom 2006, pp. 1–7 (October 2006)
Ollmann, G.: The Phishing Guide. NGS Software Insight Security Research (2005), http://www.ngssoftware.com/papers/NISRWPhishing.pdf
Kirda, E., Kruegel, C.: Protecting Users Against Phishing Attacks. In: 29th Annual International Conference on Computer Software and Applications (COMPSAC 2005), Edinburgh, Scotland, July 26-28, vol. 1, pp. 517–524 (2005)
Chandrashekaran, M., Narayana, K., Upadhyaya, S.: Phishing Email Detection Based on Structural Properties. In: Symposium on Information Assurance: Intrusion Detection and Prevention, New York (2006)
Suriya, R., Saravanan, K., Thangavelu, A.: An Integrated Approach to Detect Phishing Mail Attacks A Case Study. In: SIN 2009, North Cyprus, Turkey, October 6-10, vol. 3. ACM, New York (2009) 978-1-60558-412-6/09/10
Beck, K., Zhan, J.: Phishing in Finance. IEEE, Los Alamitos (2010) 978-1-4244-6949-9/10/$26.00
Huang, H., Zhong, S., Tan, J.: Browser-side Countermeasures for Deceptive Phishing Attack. In: Fifth International Conference on Information Assurance and Security (2009)
Irani, D., Webb, S., Giffin, J., Pu, C.: Evolutionary Study of Phishing. IEEE, Los Alamitos (2008) 978-1-4244-2969-1/08/ c_
Crain, J., Opyrchal, L., Prakash, A.: Fighting Phishing with Trusted Email. In: International Conference on Availability, Reliability and Security (2010)
Adida, B., Hohenberger, S., Rivest, R.L.: Fighting phishing attacks: a lightweight trust architecture for detecting spoofed emails, draft (February 2005)
Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Protecting people from phishing: the design and evaluation of an embedded training email system. In: CHI 2007: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 905–914. ACM, New York (2007)
Gansterer, W.N., Pölz, D.: E-Mail Classification for Phishing Defense
Oberoi, K., Sarje, A.K.: An Anti-Phishing Application for the End User. In: 3rd Hackers Workshop on Computer and Internet Security. Prabhu Goel Research Centre for Computer & Internet Security Department of Computer Science and Engineering Indian Institute of Technology Kanpur (March 17-19, 2009)
Yu, W.D., Nargundkar, S., Tiruthani, N.: PhishCatch – A Phishing Detection Tool. In: 33rd Annual IEEE International Computer Software and Applications Conference (2009)
Beck, K., Zhan, J.: Phishing in Finance. IEEE, Los Alamitos (2010) 978-1-4244-6949-9/10/
Phishing Activity Trends Report (2009), http://www.antiphishing.org/reports/apwg_report_pdf
Phishing Activity Trends Report, 1st Half (2010), http://www.antiphishing.org/reports/apwg_report_h1_2010.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Firake, S.M., Soni, P., Meshram, B.B. (2011). Tool for Prevention and Detection of Phishing E-Mail Attacks. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22540-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-22540-6_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22539-0
Online ISBN: 978-3-642-22540-6
eBook Packages: Computer ScienceComputer Science (R0)