Presentation is loading. Please wait.

Presentation is loading. Please wait.

ONLINE DETECTION AND PREVENTION PHISHING ATTACKS

Similar presentations


Presentation on theme: "ONLINE DETECTION AND PREVENTION PHISHING ATTACKS"— Presentation transcript:

1 ONLINE DETECTION AND PREVENTION PHISHING ATTACKS

2 CONTENTS About Phishing Existing System Proposal System Modules
Requirements

3 About Phishing : Phishing is the process of hacking user’s security information like bank accounts, credit card numbers …etc. In this process users will receive s with hyperlinks with information like it is sent from banks and when user clicks on links users will be routed to a unknown website which ask for bank account details like password changes, credit card details.

4 When users enter his details hackers will capture that information at server side and use that information for transferring money from bank accounts. In order to solve this problem we use anti phishing algorithms called as link guard which works on character based to block phishing mails.

5 EXISTING SYSTEM: Blacklist-based technique with low false alarm probability, but it cannot detect the websites that are not in the black list database. Because the life cycle of phishing websites is too short and the establishment of black list has a long lag time, the accuracy of blacklist is not too high.

6 PROPOSAL SYSTEM: In this project is to implement a anti phishing algorithm called as link guard algorithm which works on character based so it can detect known phishing attacks which are in black list and also unknown ones which are not in black list . And then these phishing attacks are added to black list.

7 MODULE EXPLANATION: Phishing can generally occur with Banking websites or e-shopping websites. This project explains the implementation of the Link Guard algorithm using a mail-box system. There are three modules involved in this project: Creation of a mail system and database operations Composes, send and receive a mail Implementation of the Link Guard algorithm

8 interface for the home page, sign-in, sign-up and
MODULE 1 This module deals with the user interface for the home page, sign-in, sign-up and forgot your password pages. - This module enables a new user to Sign-Up. - It also enables an existing user to Sign-In. - The user may use the Forget password link if he did forget his password. The password is retrieved on the basis of security question and answer given by the user.

9 MODULE 2 The module 2 enables the user to compose and send a mail
MODULE 2 The module 2 enables the user to compose and send a mail. It also allows the user to read a received mail. Once a mail is sent the date and the subject of the mail gets displayed. The received mail can be checked if it is phishing or not , the implementation of which is given in the next module. The compose mail option contains an option for spoof id.

10 The spoof id allows the mail of the
Composer to be delivered with a different from address. This is being incorporated to demonstrate the Link Guard algorithm.

11 MODULE 3 The module contains the implementation of the Link Guard algorithm. It is possible for the user to add domain names and categorize them as either white list or black list under settings. Whenever a mail is detected as phishing the domain name in that mail automatically gets added as black list. The Link Guard algorithm checks if the domain names fall under any of the 5 categories of hyperlinks for phishing s.

12 It also refers to the database of black and
white list entries and sets the status of the mail as either Phishing or Non-Phishing. Once the mail is categorized as Phishing the user can take care that he does not open the link or submit any personal, critical information on to the website. 

13 System Requirements Specifications
Software Requirements  The minimum requirements for detection and prevention of phishing attacks are: Operating System   :        Windows 2000/XP Documentation Tool   :  Ms word 2000  Hardware Requirements The minimum hardware requirements are: Hard disk    :  GB and above RAM     :  MB and above Processor speed   :          1.6 GHz and above

14 WT (Web-Technoligies) DBMS( Data Base Management System)
Platform Used : JAVA Front End : WT (Web-Technoligies) Back End : DBMS( Data Base Management System)

15 THANK YOU B.PAVANI (511) CH.JAGADESH ( 523) D.BHAVANA (534 )
Presented By A.BINDU MADHAVI(501) B.PAVANI (511) CH.JAGADESH ( 523) D.BHAVANA (534 ) K.SHYAM (551) K.HARIKA (553) guide : UMA DEVI mAM


Download ppt "ONLINE DETECTION AND PREVENTION PHISHING ATTACKS"

Similar presentations


Ads by Google