SlideShare a Scribd company logo
Development Of a User Friendly, Feature rich,
                 Practical Appraisal Tracker
          E.Bhanu Prakash                                     Ch.Bhavya                                     V.Prashanthi
            09P61A0511                                       09P61A0514                                     09P61A0551
  Computer Science & Engineering                 Computer Science & Engineering                Computer Science & Engineering
              VBIT                                           VBIT                                          VBIT




  Objective—Main idea of this project is to implement an                  •     Web server              :      Apache Tomcat 5.1
appraisal track which works on character based so it can detect
known phishing attacks and also unknown ones.                             •    Languages                :      Java ,JSP and JDBC

                          I. ABSTRACT
    Phishing is a new word produced from 'fishing', it refers to      Hardware Requirements
the act that the attacker allure users to visit a faked Web site by
sending them faked e-mails (or instant messages), and
stealthily get victim's personal information such as user name,
password, and national security ID, etc. The frequently used          The minimum hardware requirements are:
attack method is to send e-mails to potential victims, which
seemed to be sent by banks, online organizations, or ISPs. In
these e-mails, they will make up some causes, e.g. the
password of your credit card had been mis-entered for many                •    Hard disk               :       20 GB and above
times, or they are providing upgrading services, to allure you
                                                                          •    RAM                      :       256 MB and above
visit their web site to conform or modify your account number
and password through the hyperlink provided in the e-mail. If             •    Processor speed         :       1.6 GHz and above
you input the account number and password, the attackers then
successfully collect the information at the server side.
      Our analysis identifies that the phishing hyperlinks share                       III. SCOPE/APPLICATIONS
one or more characteristics as listed below:                                Characteristics of the hyperlinks that were embedded in
       1) The visual link and the actual link are not the same;         phishing e-mails are identified. We then design an anti-
          2) The attackers often use dotted decimal IP address          phishing algorithm, Link Guard, based on the derived
instead of DNS name;                                                    characteristics. Since Phishing Guard is characteristic
           3) Special tricks are used to encode the hyperlinks          based, it can not only detect known attacks, but also is
maliciously.                                                            effective to the unknown ones.
        4) The attackers often use fake DNS names that are                     We implement Link Guard for Windows XP. We
similar (but not identical) with the target website.                    believe that Link Guard is not only useful for detecting
                                                                        phishing attacks, but also can shield users from malicious
                                                                        or unsolicited links in Web pages and Instant messages.
        II. TECHNOLOGIES USED WITH VERSIONS                             Our future work includes further extending the Link Guard
Software Requirements                                                   algorithm, so that it can handle CSS (cross site scripting)
                                                                        attacks.
                                                                                                 REFERENCES
    •    Operating System         :       Windows 2000/XP             [1] G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of
                                                                          Lipschitz-Hankel type involving products of Bessel functions,”
    •    Documentation Tool       :       Ms word 2000

                                                      (For Department use only)
Guide Name                            :                                             Guide Signature with date             :

Date of Verification                  :                                             Date of Submission
(to be filled by Project Guide)                                                     (to be filled by Project Coordinator) :
Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April      [5] R. Nicole, “Title of paper with only first word capitalized,” J.
    1955. (references)                                                    Name Stand. Abbrev., in press.
[2] J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd    [6] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron
    ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.                       spectroscopy studies on magneto-optical media and plastic
[3] I. S. Jacobs and C. P. Bean, “Fine particles, thin films and          substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp.
    exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H.       740–741, August 1987 [Digests 9th Annual Conf. Magnetics
    Suhl, Eds. New York: Academic, 1963, pp. 271–350.                     Japan, p. 301, 1982].
[4] K. Elissa, “Title of paper if known,” unpublished.                [7] M. Young, The Technical Writer's Handbook. Mill Valley, CA:
                                                                          University Science, 1989.



                                                                  -o0o-




                                                      (For Department use only)
Guide Name                            :                                             Guide Signature with date              :

Date of Verification                  :                                             Date of Submission
(to be filled by Project Guide)                                                     (to be filled by Project Coordinator) :

More Related Content

Similar to Abstract format(1) 2345

Unit 1 Webtechnology
Unit 1 WebtechnologyUnit 1 Webtechnology
Unit 1 Webtechnology
Abhishek Kesharwani
 
Develop a Messaging App on AWS in One Day
Develop a Messaging App on AWS in One DayDevelop a Messaging App on AWS in One Day
Develop a Messaging App on AWS in One Day
Amazon Web Services
 
website phishing by NR
website phishing by NRwebsite phishing by NR
website phishing by NR
NARESH GUMMAGUTTA
 
Analysis
AnalysisAnalysis
A Survey on Various Web Technologies
A Survey on Various Web TechnologiesA Survey on Various Web Technologies
A Survey on Various Web Technologies
ijsrd.com
 
Stan_Wang_Resume
Stan_Wang_ResumeStan_Wang_Resume
Stan_Wang_ResumeJia Wang
 
Dineshotham Kumar Khambhammettu
Dineshotham Kumar KhambhammettuDineshotham Kumar Khambhammettu
Dineshotham Kumar Khambhammettu
Dineshotham Kumar Khambhammettu
 
Kunal bhatia resume mass
Kunal bhatia   resume massKunal bhatia   resume mass
Kunal bhatia resume mass
Kunal Bhatia, MBA Candidate, BSc.
 
AngularJS + NancyFx + MongoDB = The best trio for ultimate SPA by Bojan Velja...
AngularJS + NancyFx + MongoDB = The best trio for ultimate SPA by Bojan Velja...AngularJS + NancyFx + MongoDB = The best trio for ultimate SPA by Bojan Velja...
AngularJS + NancyFx + MongoDB = The best trio for ultimate SPA by Bojan Velja...
Bojan Veljanovski
 
Mobile SDK: Considerations & Best Practices
Mobile SDK: Considerations & Best Practices Mobile SDK: Considerations & Best Practices
Mobile SDK: Considerations & Best Practices
LivePerson
 
Web Application Development Tools for Creating Perfect User Experience
Web Application Development Tools for Creating Perfect User ExperienceWeb Application Development Tools for Creating Perfect User Experience
Web Application Development Tools for Creating Perfect User Experience
ChromeInfo Technologies
 
2009 CTSA Profiles OpenSocial Poster
2009 CTSA Profiles OpenSocial Poster2009 CTSA Profiles OpenSocial Poster
2009 CTSA Profiles OpenSocial Posterericmeeks
 
.NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш...
.NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш....NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш...
.NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш...
NETFest
 
074Aman.pptx
074Aman.pptx074Aman.pptx
074Aman.pptx
132YashDuttPandey
 
Node.js Web Development.pdf
Node.js Web Development.pdfNode.js Web Development.pdf
Node.js Web Development.pdf
Fariha Tasnim
 
Santhosh build and release (1)
Santhosh build and release (1)Santhosh build and release (1)
Santhosh build and release (1)
Santhosh Dodda
 
What is .NET Chinese ver
What is .NET Chinese verWhat is .NET Chinese ver
What is .NET Chinese ver
Duran Hsieh
 

Similar to Abstract format(1) 2345 (20)

Unit 1 Webtechnology
Unit 1 WebtechnologyUnit 1 Webtechnology
Unit 1 Webtechnology
 
Develop a Messaging App on AWS in One Day
Develop a Messaging App on AWS in One DayDevelop a Messaging App on AWS in One Day
Develop a Messaging App on AWS in One Day
 
website phishing by NR
website phishing by NRwebsite phishing by NR
website phishing by NR
 
Analysis
AnalysisAnalysis
Analysis
 
A Survey on Various Web Technologies
A Survey on Various Web TechnologiesA Survey on Various Web Technologies
A Survey on Various Web Technologies
 
Web tech chapter 1 (1)
Web tech chapter 1 (1)Web tech chapter 1 (1)
Web tech chapter 1 (1)
 
Stan_Wang_Resume
Stan_Wang_ResumeStan_Wang_Resume
Stan_Wang_Resume
 
Dineshotham Kumar Khambhammettu
Dineshotham Kumar KhambhammettuDineshotham Kumar Khambhammettu
Dineshotham Kumar Khambhammettu
 
Kunal bhatia resume mass
Kunal bhatia   resume massKunal bhatia   resume mass
Kunal bhatia resume mass
 
AngularJS + NancyFx + MongoDB = The best trio for ultimate SPA by Bojan Velja...
AngularJS + NancyFx + MongoDB = The best trio for ultimate SPA by Bojan Velja...AngularJS + NancyFx + MongoDB = The best trio for ultimate SPA by Bojan Velja...
AngularJS + NancyFx + MongoDB = The best trio for ultimate SPA by Bojan Velja...
 
Profile_Stephen_05564o
Profile_Stephen_05564oProfile_Stephen_05564o
Profile_Stephen_05564o
 
Mobile SDK: Considerations & Best Practices
Mobile SDK: Considerations & Best Practices Mobile SDK: Considerations & Best Practices
Mobile SDK: Considerations & Best Practices
 
Web Application Development Tools for Creating Perfect User Experience
Web Application Development Tools for Creating Perfect User ExperienceWeb Application Development Tools for Creating Perfect User Experience
Web Application Development Tools for Creating Perfect User Experience
 
2009 CTSA Profiles OpenSocial Poster
2009 CTSA Profiles OpenSocial Poster2009 CTSA Profiles OpenSocial Poster
2009 CTSA Profiles OpenSocial Poster
 
.NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш...
.NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш....NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш...
.NET Fest 2018. Олександр Краковецький. Microsoft AI: створюємо програмні ріш...
 
074Aman.pptx
074Aman.pptx074Aman.pptx
074Aman.pptx
 
Node.js Web Development.pdf
Node.js Web Development.pdfNode.js Web Development.pdf
Node.js Web Development.pdf
 
Santhosh build and release (1)
Santhosh build and release (1)Santhosh build and release (1)
Santhosh build and release (1)
 
What is .NET Chinese ver
What is .NET Chinese verWhat is .NET Chinese ver
What is .NET Chinese ver
 
Unit 1
Unit 1 Unit 1
Unit 1
 

Abstract format(1) 2345

  • 1. Development Of a User Friendly, Feature rich, Practical Appraisal Tracker E.Bhanu Prakash Ch.Bhavya V.Prashanthi 09P61A0511 09P61A0514 09P61A0551 Computer Science & Engineering Computer Science & Engineering Computer Science & Engineering VBIT VBIT VBIT Objective—Main idea of this project is to implement an • Web server : Apache Tomcat 5.1 appraisal track which works on character based so it can detect known phishing attacks and also unknown ones. • Languages : Java ,JSP and JDBC I. ABSTRACT Phishing is a new word produced from 'fishing', it refers to Hardware Requirements the act that the attacker allure users to visit a faked Web site by sending them faked e-mails (or instant messages), and stealthily get victim's personal information such as user name, password, and national security ID, etc. The frequently used The minimum hardware requirements are: attack method is to send e-mails to potential victims, which seemed to be sent by banks, online organizations, or ISPs. In these e-mails, they will make up some causes, e.g. the password of your credit card had been mis-entered for many • Hard disk : 20 GB and above times, or they are providing upgrading services, to allure you • RAM : 256 MB and above visit their web site to conform or modify your account number and password through the hyperlink provided in the e-mail. If • Processor speed : 1.6 GHz and above you input the account number and password, the attackers then successfully collect the information at the server side. Our analysis identifies that the phishing hyperlinks share III. SCOPE/APPLICATIONS one or more characteristics as listed below: Characteristics of the hyperlinks that were embedded in 1) The visual link and the actual link are not the same; phishing e-mails are identified. We then design an anti- 2) The attackers often use dotted decimal IP address phishing algorithm, Link Guard, based on the derived instead of DNS name; characteristics. Since Phishing Guard is characteristic 3) Special tricks are used to encode the hyperlinks based, it can not only detect known attacks, but also is maliciously. effective to the unknown ones. 4) The attackers often use fake DNS names that are We implement Link Guard for Windows XP. We similar (but not identical) with the target website. believe that Link Guard is not only useful for detecting phishing attacks, but also can shield users from malicious or unsolicited links in Web pages and Instant messages. II. TECHNOLOGIES USED WITH VERSIONS Our future work includes further extending the Link Guard Software Requirements algorithm, so that it can handle CSS (cross site scripting) attacks. REFERENCES • Operating System : Windows 2000/XP [1] G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” • Documentation Tool : Ms word 2000 (For Department use only) Guide Name : Guide Signature with date : Date of Verification : Date of Submission (to be filled by Project Guide) (to be filled by Project Coordinator) :
  • 2. Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April [5] R. Nicole, “Title of paper with only first word capitalized,” J. 1955. (references) Name Stand. Abbrev., in press. [2] J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd [6] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73. spectroscopy studies on magneto-optical media and plastic [3] I. S. Jacobs and C. P. Bean, “Fine particles, thin films and substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Suhl, Eds. New York: Academic, 1963, pp. 271–350. Japan, p. 301, 1982]. [4] K. Elissa, “Title of paper if known,” unpublished. [7] M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science, 1989. -o0o- (For Department use only) Guide Name : Guide Signature with date : Date of Verification : Date of Submission (to be filled by Project Guide) (to be filled by Project Coordinator) :