Phishing in Internet Technology

Introduction:

               Phishing is a criminal trick of stealing victim’s personal information by urging them to visit a forged webpage that looks like a true one. The victims may finally suffer losses of money or other kinds. We propose a method to detect the phishing webpages based on visual similarity assessment. If the visual similarity of a webpage to the true webpage is high, the owner will be alerted who will in turn take the necessary actions to immediately prevent potential phishing attacks and hence protect its brand and reputation. An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate webpage owner registers to our Anti- Phishing group. The group in turn searches the Web for suspicious webpages which are visually similar to the true webpage.

             A webpage is reported as a phishing suspect if the visual similarity of the respective web page to the true page is high. An important feature of a phishing webpage is its visual similarity to its target (true) webpage. Hence, an anti-phishing agent can detect suspicious URLs and compare the corresponding Web Pages with the true one in visual aspects. In our approach, the visual similarity between two web pages is measured in two main metrics: Text-Level and Image-Level. The prime step is to categorize the codes of the web pages to facilitate further comparisons.   
       
PHISHING:
  • Phishing is an act of attempt to acquire information such as usernames, passwords, and credit card details etc. of a person or organization illegally in an electronic communication.
  • Phishing is committed so that the criminal may obtain sensitive and valuable information about a consumer, usually with the goal of fraud to obtain the customer bank and other financial information.
  • Phishing are typically carried out by e-mail spoofing or instant messaging.
  • In phishing criminal create a fake website whose looks and feel are identical to the legitimate one, in which the victims are told to enter their confidential details like user name, password or account details.
  • Phishing technique was described in detail in the year 1987 and this technique was first used in the year 1995
  • Phishing is mainly committed, so that the criminal may obtain sensitive n phishing the criminals creates a fake website whose looks & valuable information about the customer.
  • Phishing makes high profit with less or small technological investment




Date:

Share this

Related Posts

Previous
Next Post »