Your SlideShare is downloading. ×
0
Presented by, Md. Merazul Islam (0507036) & Shuvradeb Barman Srijon (0507044) Supervised by, Mr. Muhammad Sheikh Sadi Assi...
<ul><li>Cyber Crime- the major concern. </li></ul><ul><li>Internet fraud affects the rapidly growing online services. </li...
<ul><li>A criminal trick of stealing sensitive personal information. </li></ul><ul><li>Fooled user and push them to fall i...
<ul><li>Phishing attacks succeed if users fail to detect phishing sites. </li></ul><ul><li>Previous anti-phishing falls in...
<ul><li>Similar appearance of web-page. </li></ul><ul><li>IP based URL & Non Matching URL. </li></ul><ul><li>URL contain a...
<ul><li>According to APWG </li></ul><ul><li>According to PhishTank </li></ul>Total phishing attack. (Up to 6 th  April 201...
<ul><li>Social response </li></ul><ul><ul><li>Educating people. </li></ul></ul><ul><ul><li>Changing habit. </li></ul></ul>...
 
 
 
 
Approach Accuracy Time (second) IP based URL 100% 17 Exists in phishing database 97% 59 Matching source content 81% 134 Ab...
<ul><li>Our approach reduces the ability of attackers to automate their attacks, cutting into their profitability.  </li><...
 
Upcoming SlideShare
Loading in...5
×

thesis 36 44 Final

493

Published on

final thesis presentation slide

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
493
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "thesis 36 44 Final"

  1. 1. Presented by, Md. Merazul Islam (0507036) & Shuvradeb Barman Srijon (0507044) Supervised by, Mr. Muhammad Sheikh Sadi Assistant Professor Department of Computer Science and Engineering Khulna University of Engineering and Technology Khulna 9203, Bangladesh.
  2. 2. <ul><li>Cyber Crime- the major concern. </li></ul><ul><li>Internet fraud affects the rapidly growing online services. </li></ul><ul><li>E-commerce is the main target. </li></ul><ul><li>Social communication sites and mail service are also attack of them. </li></ul><ul><li>Technical steps needed to defend them. </li></ul>
  3. 3. <ul><li>A criminal trick of stealing sensitive personal information. </li></ul><ul><li>Fooled user and push them to fall in the trick. </li></ul><ul><li>Use social engineering and technical strategy. </li></ul><ul><li>Mainly, duplicate original web-pages. </li></ul><ul><li>First describe in 1987. </li></ul>
  4. 4. <ul><li>Phishing attacks succeed if users fail to detect phishing sites. </li></ul><ul><li>Previous anti-phishing falls into four categories: </li></ul><ul><ul><li>Study on phishing </li></ul></ul><ul><ul><li>Training people </li></ul></ul><ul><ul><li>User interface </li></ul></ul><ul><ul><li>Detection tools </li></ul></ul><ul><li>Precious works deals with limited service. </li></ul><ul><li>Our approach- Development of an automated phishing detection method. </li></ul>
  5. 5. <ul><li>Similar appearance of web-page. </li></ul><ul><li>IP based URL & Non Matching URL. </li></ul><ul><li>URL contain abnormal characters. </li></ul><ul><li>Mis-spelled URL. </li></ul><ul><li>Using script or add-in to web browser to cover the address bar. </li></ul>
  6. 6. <ul><li>According to APWG </li></ul><ul><li>According to PhishTank </li></ul>Total phishing attack. (Up to 6 th April 2010) Phishes Verified as Valid Suspected Phishes Submitted Total 531086 Total 928206 Online 2770 Online 3021 Offline 528316 Offline 925174
  7. 7. <ul><li>Social response </li></ul><ul><ul><li>Educating people. </li></ul></ul><ul><ul><li>Changing habit. </li></ul></ul><ul><li>Technical support </li></ul><ul><ul><li>Identify phishing site. </li></ul></ul><ul><ul><li>Implementation of secure model. </li></ul></ul><ul><ul><li>Browser alert. </li></ul></ul><ul><ul><li>Eliminating phishing mails. </li></ul></ul><ul><ul><li>Monitoring and Takedown. </li></ul></ul>
  8. 12. Approach Accuracy Time (second) IP based URL 100% 17 Exists in phishing database 97% 59 Matching source content 81% 134 Abnormal condition 79% 51
  9. 13. <ul><li>Our approach reduces the ability of attackers to automate their attacks, cutting into their profitability. </li></ul><ul><li>By using the minimal knowledge base provided by the user-selected web-page, our system is able to compare potential phishing sites with real sites. </li></ul><ul><li>Performance and accuracy can be improved by using an image segmentation. </li></ul><ul><li>Flash contents can’t be validated whether phishing threat or not in our system. </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×