Email Phishing Attack Mitigation using Server Side Email Addon

作者: J Dileep Kumar , V Srikanth , L Tejeswini , None

DOI: 10.17485/IJST/2016/V9I19/91161

关键词:

摘要: Background/Objectives: Attackers using the anonymity provided in Internet, by which they are representing themselves as legitimate users/companies and sending fake offers/messages to users. Objective of this paper is mitigate phishing attack email messages analyzing contents. Methods/Statistical Analysis: In paper, we discuss a new server side anti addon algorithm, properties associated with hyper-links, present emails. The methods used here comparison methods, compare similarity links anchor text that links. Findings: With algorithm found way phishing. Applications/ Improvements: We improved accuracy finding mails checking http mail tools redirect user site.

参考文章(14)
Ali Meskarbashee, Mohammad Sadegh Javadi, New Approach to Congestion Mitigation Based on Incidence Matrix DCOPF Indian journal of science and technology. ,vol. 5, pp. 2132- 2137 ,(2012) , 10.17485/IJST/2012/V5I2/30353
M. Chandrasekaran, R. Chinchani, S. Upadhyaya, PHONEY: mimicking user response to detect phishing attacks world of wireless, mobile and multimedia networks. pp. 668- 672 ,(2006) , 10.1109/WOWMOM.2006.87
J. John Livingston, A. Umamakeswari, Internet of Things Application using IP-enabled Sensor Node and Web Server Indian journal of science and technology. ,vol. 8, pp. 207- 212 ,(2015) , 10.17485/IJST/2015/V8IS9/65577
Min Wu, Robert C. Miller, Simson L. Garfinkel, Do security toolbars actually prevent phishing attacks human factors in computing systems. pp. 601- 610 ,(2006) , 10.1145/1124772.1124863
Alexandros Ntoulas, Marc Najork, Mark Manasse, Dennis Fetterly, Detecting spam web pages through content analysis Proceedings of the 15th international conference on World Wide Web - WWW '06. pp. 83- 92 ,(2006) , 10.1145/1135777.1135794
E. Kirda, C. Kruegel, Protecting users against phishing attacks with AntiPhish computer software and applications conference. ,vol. 1, pp. 517- 524 ,(2005) , 10.1109/COMPSAC.2005.126
Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker, Identifying suspicious URLs Proceedings of the 26th Annual International Conference on Machine Learning - ICML '09. pp. 681- 688 ,(2009) , 10.1145/1553374.1553462
Ian Fette, Norman Sadeh, Anthony Tomasic, Learning to detect phishing emails the web conference. pp. 649- 656 ,(2007) , 10.1145/1242572.1242660
Yue Zhang, Jason I. Hong, Lorrie F. Cranor, Cantina: a content-based approach to detecting phishing web sites the web conference. pp. 639- 648 ,(2007) , 10.1145/1242572.1242659
Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker, Beyond blacklists Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '09. pp. 1245- 1254 ,(2009) , 10.1145/1557019.1557153