Enhanced detection of Phishing through pattern based recognition for securing human interaction through WEB pages (original) (raw)

Towards detecting phishing web contents for secure internet surfing

Now a days, a significant web based crisis are causing internet users to be attracted to visit the fake websites and thus being mistreated into providing with their confidential information to some malicious systems run by some malevolent parties. This type of fraud technique is defined as phishing. The resulted damage is ranged from denial of e-mail access to plenty of monetary losses. It has harmful impacts on e-commerce and online-banking badly. Phishing has become most popular practice among the web criminals and such attacks are becoming very much sophisticated and frequently on the rise as newer means and attacking vectors are adopted. Traditional anti-phishing tools try to mitigate the attacks partially. Most of the tools are focused on protecting users. This paper proposes a novel phishing detection approach by considering some attributes that are exploited to conduct attacks. The proposed method works both online and offline mode in a faster way reducing time and space overhead in comparison to existing dominant approaches.

Webpage Classification for Detecting Phishing Attack

2020

Despite numerous research efforts, phishing attacks remain prevalent and highly effective in luring unsuspecting users to reveal sensitive information, including account credentials and social security numbers. In this paper, we propose the use of three machine algorithm to help in the detection of phishing attacks. Machine learning algorithm has been popular over the years for implementing and solving different problems. Different features were observed and approximately 112 features were used from 88,648 dataset, gotten from Vrbancic UC Machine Learning Repository database. Through the use the algorithms, high accuracy were gotten especially after the application of PCA feature selection. IndexTerms principal component analysis, Machine Learning Framework.

Intelligent phishing detection system using similarity matching algorithms

International Journal of Information and Communication Technology, 2018

Today, phishing attack is one of the most common and serious threat over internet. It is used to fraud users and steal their personal information either by using spoofed e-mails or fake websites or both. In this paper, we proposed a novel intelligent phishing detection system, i.e., CSS and URI matching-based phishing detection system (CUMP) to detect zero-day phishing attacks. Our proposed approach is based on the concept of uniform resource identifier (URI) and cascading style sheet (CSS) matching. This concept is used, as phisher always tries to mimic the URI pattern and visual design in the hope that even experienced user will not be able to detect phishing website by visualisation. To mimic the visual appearance, phishers generally use same CSS style. Without using same CSS, it is very difficult to achieve the same design. To defend against phishing websites attacks especially 'zero-day' attacks, our proposed system used the basic properties of any phishing attacks for URI and CSS matching. Our proposed solution is very effective in detecting a wide range of website phishing attacks with TP and TN rate of 93.27% and 100%, respectively and results in less false positive rate.

Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages

2012

Phishing is the combination of social engineering and technical exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker (Phisher). Attempts to stop phishing by preventing a user from interacting with a malicious web site have shown to be ineffective. In this paper, present an effective image-based anti-phishing scheme based on discriminative key point features in WebPages. We use an invariant content descriptor, the Contrast Context Histogram (CCH), to compute the similarity degree between suspicious pages and authentic pages. To determine whether two images are similar, a common approach involves extracting a vector of salient features from each image, and computing the distance between the vectors, which is taken as the degree of visual difference between the two images. The results show that the proposed scheme achieves high accuracy and low error rates.

A comprehensive and efficacious architecture for detecting phishing webpages

Computers & Security, 2014

Phishing is one of the luring techniques used to exploit personal information. A phishing webpage detection system (PWDS) extracts features to determine whether it is a phishing webpage or not. Selecting appropriate features improves the performance of PWDS. The performance criteria are detection accuracy and system response time. The major time consumed by PWDS arises from feature extraction, which is considered as feature cost in this paper. Here, two novel features are proposed. They use the semantic similarity measure to determine the relationship between the content and the URL of a page. Since the suggested features do not apply third-party services such as search engine result, the feature extraction time decreases dramatically. Login form pre-filer is utilized to reduce unnecessary calculations and false positive rate. In this paper, a costbased feature selection is presented as the most effective feature. The selected features are employed in the suggested PWDS. The extreme learning machine algorithm is used to classify webpages. The experimental results demonstrate that the suggested PWDS achieves a high accuracy of 97.6% and a short average detection time of 120.07 ms.

Identification of Fraudulent Phishing Emails Based On CSS Standard Technique to Explore Similarities in Web Pages

Phishing implies an activity where an individual or a group of individuals attempt to obtain sensitive user information thus, threatening the financial or identity-related security of other individuals. Few of the preventive measures currently being taken in the said direction are: spam filtering, better authentication and detecting infringed domain-names. Better mutual authentication needs awareness on the user's part and it requires exhaustive efforts from the user's and the respective organization's side. The proposed paper aims at using a hybrid approach as the way to find web page similarities. As CSS is a commonly used technology used to define visual appearances of web pages. This paper exploits it as a way to compare genuine websites against phishing ones in order to warn the user against such attacks. Besides this, the other algorithms such as Ob-URL detection algorithm and Google safe browsing are used for enhancing the accuracy of detecting the fraudulent websites. This paper takes us through the insides of the above mentioned approach.

Bait Alarm: Anti-Phishing using visual similarities

2016

ARTICLE INFO The Phishing websites looks similar to the original one because of their appearances created by attacker or hacker and user can easily trapped into this by submitting their username and password into these fraud sites. In this research paper we developed a new algorithm called CSS algorithm. The CSS algorithm is used to detect URL phishing attacks and also it provides multilayered security to the fraud held on internet. The CSS algorithm can detect the CSS filename, CSS domain, CSS content of the file, URL of trusted site, The domain of the site, The title of the site. Fianlly we conclude through experiments that our CSS algorithm can effectively found URL Obfuscating phishing attacks.

Detection and Prevention of Phishing Attack: An Approach for Eradication of Phishing

Phishing is like masquerading the trusted party to acquire the sensitive information from users. Phishing attacks are usually carried out through fake websites, fake URLs, fake attachments in emails, fake messages. The main aim of phishing attack is to fool the users by finding the weakness of the user. One of the best step to be taken to avoid this attack is that to educate the users about the fake links given in the website, where they should not visit such links and give the required credentials. Anyhow to make understand the user about the phishing attack becomes unrealistic, attackers find many ways to fool the users for browsing the fake website where they are given their personal credentials. Here in the proposed system there are two methods one is, the urls are considered from email, keyword search, website and compared with the database and the second method is to detect Phishing through image.

Detection of Phishing Websites

IRJET, 2022

The World Wide Web handles a large amount of data. The web doubles in size every six to ten months. World Wide Web helps anyone to download and download relevant data and important content for the website can be used in all fields. The website has become the main target of the attacker. Criminals are embedded in the content on web pages with the intent to commit atrocities. That audio content includes ads, as well as known and important user- friendly data. Whenever a user finds any information on a website and delivers audio content. Web mining is one of the mining technologies that create data with a large amount of web data to improve web service. Inexperienced users using the browser have no information about the domain of the page. Users may be tricked into giving out their personal information or downloading malicious data. Our goal is to create an extension that will act as middleware between users and malicious websites and reduce users' risk of allowing such websites. In addition, all harmful content cannot be fully collected as this is also a liability for further development. To counteract this, we use web crawling and break down the new content you see all the time into specific categories so that appropriate action can be taken. The problem of accessing criminal websites to steal sensitive information can be better solved by various strategies. Based on a comparison of different strategies, Yara’s rules seem to work much better.