Skip to main content

Tool for Prevention and Detection of Phishing E-Mail Attacks

  • Conference paper
Book cover Advances in Network Security and Applications (CNSA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 196))

Included in the following conference series:

Abstract

In today’s world, the major security threat is due to Phishing attacks. Phishing attack makes web users believe that they are communicating with a trusted entity for the purpose of stealing account information, login credentials, and identity information in general. This attack method most commonly initiated by sending out e-mails with links to spoofed website that harvest the information. We propose a methodology to detect and prevent the phishing attacks on e-mail. In its more general form it is an end user application that uses hyperlink feature set to detect phishing attacks and digital signature to prevent the attack. Thus our application will act as an interface between a user and its e-mail service provider to provide secure communication. We believe that this will be a better and more cost effective way to prevent people from losing their private information due to phishing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The Anti-phishing working group, http://www.antiphishing.org/

  2. Williams, A.: Phishing Exposed. Syngress Publishing Inc., (2005)

    Google Scholar 

  3. Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. Technical Report CMU-ISRI-06-112, Institute for Software Research, Carnegie Mellon University (June 2006), http://reports-archive.admcs.cmu.edu/anon/isri2006/abstracts/06-112.html

  4. Chen, J., Guo, C.: Online Detection and Prevention of Phishing Attacks. In: IEEE Communications and Networking, ChinaCom 2006, pp. 1–7 (October 2006)

    Google Scholar 

  5. Ollmann, G.: The Phishing Guide. NGS Software Insight Security Research (2005), http://www.ngssoftware.com/papers/NISRWPhishing.pdf

  6. Kirda, E., Kruegel, C.: Protecting Users Against Phishing Attacks. In: 29th Annual International Conference on Computer Software and Applications (COMPSAC 2005), Edinburgh, Scotland, July 26-28, vol. 1, pp. 517–524 (2005)

    Google Scholar 

  7. Chandrashekaran, M., Narayana, K., Upadhyaya, S.: Phishing Email Detection Based on Structural Properties. In: Symposium on Information Assurance: Intrusion Detection and Prevention, New York (2006)

    Google Scholar 

  8. Suriya, R., Saravanan, K., Thangavelu, A.: An Integrated Approach to Detect Phishing Mail Attacks A Case Study. In: SIN 2009, North Cyprus, Turkey, October 6-10, vol. 3. ACM, New York (2009) 978-1-60558-412-6/09/10

    Google Scholar 

  9. Beck, K., Zhan, J.: Phishing in Finance. IEEE, Los Alamitos (2010) 978-1-4244-6949-9/10/$26.00

    Book  Google Scholar 

  10. Huang, H., Zhong, S., Tan, J.: Browser-side Countermeasures for Deceptive Phishing Attack. In: Fifth International Conference on Information Assurance and Security (2009)

    Google Scholar 

  11. Irani, D., Webb, S., Giffin, J., Pu, C.: Evolutionary Study of Phishing. IEEE, Los Alamitos (2008) 978-1-4244-2969-1/08/ c_

    Book  Google Scholar 

  12. Crain, J., Opyrchal, L., Prakash, A.: Fighting Phishing with Trusted Email. In: International Conference on Availability, Reliability and Security (2010)

    Google Scholar 

  13. Adida, B., Hohenberger, S., Rivest, R.L.: Fighting phishing attacks: a lightweight trust architecture for detecting spoofed emails, draft (February 2005)

    Google Scholar 

  14. Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Protecting people from phishing: the design and evaluation of an embedded training email system. In: CHI 2007: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 905–914. ACM, New York (2007)

    Google Scholar 

  15. Gansterer, W.N., Pölz, D.: E-Mail Classification for Phishing Defense

    Google Scholar 

  16. Oberoi, K., Sarje, A.K.: An Anti-Phishing Application for the End User. In: 3rd Hackers Workshop on Computer and Internet Security. Prabhu Goel Research Centre for Computer & Internet Security Department of Computer Science and Engineering Indian Institute of Technology Kanpur (March 17-19, 2009)

    Google Scholar 

  17. Yu, W.D., Nargundkar, S., Tiruthani, N.: PhishCatch – A Phishing Detection Tool. In: 33rd Annual IEEE International Computer Software and Applications Conference (2009)

    Google Scholar 

  18. Beck, K., Zhan, J.: Phishing in Finance. IEEE, Los Alamitos (2010) 978-1-4244-6949-9/10/

    Book  Google Scholar 

  19. Phishing Activity Trends Report (2009), http://www.antiphishing.org/reports/apwg_report_pdf

  20. Phishing Activity Trends Report, 1st Half (2010), http://www.antiphishing.org/reports/apwg_report_h1_2010.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Firake, S.M., Soni, P., Meshram, B.B. (2011). Tool for Prevention and Detection of Phishing E-Mail Attacks. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22540-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22540-6_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22539-0

  • Online ISBN: 978-3-642-22540-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics