TOWARDS DETECTING PHISHING WEB-PAGES<br />Presented by,<br />Md. Merazul Islam (0507036)<br />&<br />Shuvradeb Barman Srij...
Introduction<br />Cyber Crime- the major concern.<br />Internet frauds affect the rapidly growing online services.<br />E-...
Problem Statement<br />Phishing attacks succeed if users fail to detect phishing sites.<br />Previous anti-phishing falls ...
Phishing?<br />A criminal trick of stealing sensitive personal information.<br />Fooled user and push them to fall in the ...
Attributes of Phishing<br />Similar appearance of web-page.<br />IP based URL & Non Matching URL.<br />URL contain abnorma...
Phishing Stats<br />According to APWG<br />According to PhishTank<br />Total phishing attack. (Up to 6th April 2010)<br />...
Anti-phishing<br />Social response<br />Educating people.<br />Changing habit.<br />Technical support<br />Identify phishi...
Methodology<br />8<br />?<br />?<br />Step 1: Checking with database<br />
Methodology<br />9<br />?<br />?<br />?<br />Step 2: Checking abnormal conditions<br />
Methodology<br />10<br />?<br />?<br />?<br />?<br />?<br />Step 2: Search for new Phishing<br />
results<br />11<br />
Experimental analysis<br />12<br />
Discussion<br />Our approach reduces the ability of attackers to automate their attacks, cutting into their profitability....
References<br />Anti-Phishing Working Group (APWG). http://www.antiphishing.org/ . April 7 2010.<br />PhishTank. http://ww...
Thank You<br />?<br />15<br />
Upcoming SlideShare
Loading in...5
×

36.44.final

594

Published on

my undergraduate thesis presentation slide of phishing

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
594
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

36.44.final

  1. 1. TOWARDS DETECTING PHISHING WEB-PAGES<br />Presented by,<br />Md. Merazul Islam (0507036)<br />&<br />Shuvradeb Barman Srijon (0507044)<br />Supervised by,<br />Mr. Muhammad Sheikh Sadi<br />Assistant Professor<br />Department of Computer Science and Engineering<br />Khulna University of Engineering and Technology<br />Khulna 9203, Bangladesh.<br />
  2. 2. Introduction<br />Cyber Crime- the major concern.<br />Internet frauds affect the rapidly growing online services.<br />E-commerce is the main target.<br />Social communication sites and mail services are also victim of them.<br />Phishing is an alarming threat.<br />Technical steps needed to defend them.<br />2<br />
  3. 3. Problem Statement<br />Phishing attacks succeed if users fail to detect phishing sites.<br />Previous anti-phishing falls into four categories:<br />Study on phishing<br />Training people<br />User interface<br />Detection tools<br />Previous works deals with limited service.<br />Our approach- Development of an automated phishing detection method.<br />3<br />
  4. 4. Phishing?<br />A criminal trick of stealing sensitive personal information.<br />Fooled user and push them to fall in the trick.<br />Use social engineering and technical strategy.<br />Mainly, duplicate original web-pages.<br />First describe in 1987.<br />4<br />
  5. 5. Attributes of Phishing<br />Similar appearance of web-page.<br />IP based URL & Non Matching URL.<br />URL contain abnormal characters.<br />Misspelled URL.<br />Using script or add-in to web browser to cover the address bar.<br />5<br />
  6. 6. Phishing Stats<br />According to APWG<br />According to PhishTank<br />Total phishing attack. (Up to 6th April 2010)<br />6<br />
  7. 7. Anti-phishing<br />Social response<br />Educating people.<br />Changing habit.<br />Technical support<br />Identify phishing site.<br />Implementation of secure model.<br />Browser alert.<br />Eliminating phishing mails.<br />Monitoring and Takedown.<br />7<br />
  8. 8. Methodology<br />8<br />?<br />?<br />Step 1: Checking with database<br />
  9. 9. Methodology<br />9<br />?<br />?<br />?<br />Step 2: Checking abnormal conditions<br />
  10. 10. Methodology<br />10<br />?<br />?<br />?<br />?<br />?<br />Step 2: Search for new Phishing<br />
  11. 11. results<br />11<br />
  12. 12. Experimental analysis<br />12<br />
  13. 13. Discussion<br />Our approach reduces the ability of attackers to automate their attacks, cutting into their profitability. <br />By using the minimal knowledge base provided by the user-selected web-page, our system is able to compare potential phishing sites with real sites.<br />Performance and accuracy can be improved by using an image segmentation algorithm.<br />Flash contents can’t be validated whether phishing threat or not in our system.<br />13<br />
  14. 14. References<br />Anti-Phishing Working Group (APWG). http://www.antiphishing.org/ . April 7 2010.<br />PhishTank. http://www.phishtank.com/. April 6 2010.<br />Y. Zhang, J. Hong, and L. Cranor. Cantina: A content-based approach to detecting phishing web sites. 16th international conference on World Wide Web in 2007.<br />Felix, Jerry and Hauck, Chris (September 1987). "System Security: A Hacker's Perspective". 1987 Interex Proceedings1: 6. <br />14<br />
  15. 15. Thank You<br />?<br />15<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×