Académique Documents
Professionnel Documents
Culture Documents
BYCHAITHRASHREE B K
WHAT IS PHISHING?
Phishing is an attack of identity theft, where criminals create fake web sites which counterfeit as famous organizations and ask users to fill out their personal confidential information. It is a criminal activity using social engineering techniques. It is also called as brand spoofing.
to a study by Gartner, 57 million Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information.
1000
2000
3000
4000
5000
6000
0 08/07 08/08 08/09 08/10 08/11 08/12 09/01 09/02 09/03 09/04 09/05 09/06 09/07 09/08 09/09 09/10 09/11 09/12 10/01 10/02 10/03 10/04 10/05 10/06 10/07 10/08 10/09 10/11 10/12 11/01 11/02 11/03 11/04 11/05 11/06 11/07 11/08 11/09 11/10
EXAMPLE:
http://signinebay.com-cgibin.tk/eBaydll.php
principal phishing web pages are more likely to be hidden deeply in phishing websites to avoid phishing detection, so their entire URLs are always complicated and multilevel. The living time of phishing URLs is shorter and shorter.
SPOOFED E-MAILS:
The
idea here to persuade the victim to send back sensitive information, using an e-mail formal request. Similar to scam where the attacker send a fake winning notification to the victim asking for his credit card number and so on
organizations, such as banks, do not provide interactive services based on e-mail where the user has to provide a password but use their websites to provide such interactive services (even on SSL!).
phishing attacks are technically more sophisticated and make use of wellknown vulnerabilities in popular web browsers such the Internet Explorer to install malicious software that collects sensitive information about the victim. Which malware will the attackers use?
Phishing Repository
TOP N
Phishing URL
APAC
CONCLUSION:
The results of the present study are as follows: A hybrid method to discover phishing attacks actively by DNS logs and known phishing knowledge. Phishing detection system reporting Chinese phishing attacks to APAC and its contribution in anti-phishing.
determine the quantity of high frequency paths, that are needed in constructing URLs in order to balance computing efficiency and recall rate. Visual similarity in calculating LD between strings can be considered.
REFERENCE:
www.google.com www.wikipedia.com
http://technet.microsoft.com
THANK YOU