About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
ew 18(20): e16

Research Article

Review of Various Methods for Phishing Detection

Download1823 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.12-9-2018.155746,
        author={R. Sakunthala jenni and S. Shankar},
        title={Review of Various Methods for Phishing Detection},
        journal={EAI Endorsed Transactions on Energy Web and Information Technologies},
        volume={5},
        number={20},
        publisher={EAI},
        journal_a={EW},
        year={2018},
        month={9},
        keywords={phishing, anti-phishing, hackers, fraud websites, legitimate websites},
        doi={10.4108/eai.12-9-2018.155746}
    }
    
  • R. Sakunthala jenni
    S. Shankar
    Year: 2018
    Review of Various Methods for Phishing Detection
    EW
    EAI
    DOI: 10.4108/eai.12-9-2018.155746
R. Sakunthala jenni1,*, S. Shankar2
  • 1: Research Scholar, Department of Computer Science and Engineering, Hindusthan College of Engineering and Technology, Coimbatore, India.
  • 2: Professor, Department of Computer Science and Engineering, Hindusthan College of Engineering and Technology, Coimbatore, India.
*Contact email: kalaivanijenni@gmail.com

Abstract

In this modern world where the technology has spread rapidly and the inception of cell phones, computers and also the rate at which internet is being used has increased in all fields both commercial, financial and also individuals. The above said inception is a boon but the users are facing dangerous challenges. Hence phishing and information pilfering which are done through spams and deceptive emails. This kind of spams and deceptive emails could lead to great losses for institutions like financial and similar ones. It is understood that in the beginning it is very difficult to judge or trace the modesoprandi of these hackers. To ascertain this cryptic methods of phishing attacks can be effectively done only by developing a particular software thereby safe guard the users. To pick out and detect the operation methods of hackers, the researcher uses the Data Mining process where a number of datamining tools, which analysis the data are used. This learning, basically is Data Miming process and the informations are taken out through different outlets and sources.

Keywords
phishing, anti-phishing, hackers, fraud websites, legitimate websites
Received
2018-05-31
Accepted
2018-09-10
Published
2018-09-12
Publisher
EAI
http://dx.doi.org/10.4108/eai.12-9-2018.155746

Copyright © 2018 R.Sakunthala jenni et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL