• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
36.44.final
 

36.44.final

on

  • 728 views

my undergraduate thesis presentation slide of phishing

my undergraduate thesis presentation slide of phishing

Statistics

Views

Total Views
728
Views on SlideShare
726
Embed Views
2

Actions

Likes
0
Downloads
12
Comments
0

2 Embeds 2

http://jujo00obo2o234ungd3t8qjfcjrs3o6k-a-sites-opensocial.googleusercontent.com 1
https://jujo00obo2o234ungd3t8qjfcjrs3o6k-a-sites-opensocial.googleusercontent.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    36.44.final 36.44.final Presentation Transcript

    • TOWARDS DETECTING PHISHING WEB-PAGES
      Presented by,
      Md. Merazul Islam (0507036)
      &
      Shuvradeb Barman Srijon (0507044)
      Supervised by,
      Mr. Muhammad Sheikh Sadi
      Assistant Professor
      Department of Computer Science and Engineering
      Khulna University of Engineering and Technology
      Khulna 9203, Bangladesh.
    • Introduction
      Cyber Crime- the major concern.
      Internet frauds affect the rapidly growing online services.
      E-commerce is the main target.
      Social communication sites and mail services are also victim of them.
      Phishing is an alarming threat.
      Technical steps needed to defend them.
      2
    • Problem Statement
      Phishing attacks succeed if users fail to detect phishing sites.
      Previous anti-phishing falls into four categories:
      Study on phishing
      Training people
      User interface
      Detection tools
      Previous works deals with limited service.
      Our approach- Development of an automated phishing detection method.
      3
    • Phishing?
      A criminal trick of stealing sensitive personal information.
      Fooled user and push them to fall in the trick.
      Use social engineering and technical strategy.
      Mainly, duplicate original web-pages.
      First describe in 1987.
      4
    • Attributes of Phishing
      Similar appearance of web-page.
      IP based URL & Non Matching URL.
      URL contain abnormal characters.
      Misspelled URL.
      Using script or add-in to web browser to cover the address bar.
      5
    • Phishing Stats
      According to APWG
      According to PhishTank
      Total phishing attack. (Up to 6th April 2010)
      6
    • Anti-phishing
      Social response
      Educating people.
      Changing habit.
      Technical support
      Identify phishing site.
      Implementation of secure model.
      Browser alert.
      Eliminating phishing mails.
      Monitoring and Takedown.
      7
    • Methodology
      8
      ?
      ?
      Step 1: Checking with database
    • Methodology
      9
      ?
      ?
      ?
      Step 2: Checking abnormal conditions
    • Methodology
      10
      ?
      ?
      ?
      ?
      ?
      Step 2: Search for new Phishing
    • results
      11
    • Experimental analysis
      12
    • Discussion
      Our approach reduces the ability of attackers to automate their attacks, cutting into their profitability.
      By using the minimal knowledge base provided by the user-selected web-page, our system is able to compare potential phishing sites with real sites.
      Performance and accuracy can be improved by using an image segmentation algorithm.
      Flash contents can’t be validated whether phishing threat or not in our system.
      13
    • References
      Anti-Phishing Working Group (APWG). http://www.antiphishing.org/ . April 7 2010.
      PhishTank. http://www.phishtank.com/. April 6 2010.
      Y. Zhang, J. Hong, and L. Cranor. Cantina: A content-based approach to detecting phishing web sites. 16th international conference on World Wide Web in 2007.
      Felix, Jerry and Hauck, Chris (September 1987). "System Security: A Hacker's Perspective". 1987 Interex Proceedings1: 6.
      14
    • Thank You
      ?
      15