1. Detection and prevention of Phishing Attacks
- Author
-
Lavkush Gupta, Madhuri Gedam, Rucha Desai, and Abu Saad Choudhary
- Subjects
Information Systems and Management ,Computer science ,Phishing attack ,computer.file_format ,Phishing detection ,Computer security ,computer.software_genre ,Phishing ,HTML element ,Similarity (psychology) ,Formatted text ,Feature set ,computer ,Software ,Information Systems ,Web site - Abstract
Phishing is one amongst the main issues visaged by cyber-world and ends up in monetary losses for each industries and people. Detection of phishing attack with high accuracy has forever been a difficult issue. At present, visual similarities-based techniques square measure terribly helpful for police work phishing websites expeditiously. Phishing web site appearance terribly similar in look to its corresponding legitimate web site to deceive users into basic cognitive process that they are browsing the right web site. Visual similarity primarily based phishing detection techniques utilize the feature set like text content, text format, HTML tags, Cascading sheet (CSS), image, then forth, to form the choice. These approaches compare the suspicious web site with the corresponding legitimate web site by victimisation numerous options and if the similarity is larger than the predefined threshold price then it is declared phishing [2].
- Published
- 2021