BHARATI VIDYAPEETH 
INSTITUTE OF TECHNOLOGY 
KHARGHAR 
DEPARTMENT OF COMPUTER TECHNOLOGY 
YEAR 2013-2014 
SYNOPSIS ON 
“AN ADVANCED TECHNIQUE FOR ANALYZING 
AND PREVENTING PHARMING ATTACKS ON 
HYBRID NETWORK 
UNDER THE GUIDANCE OF 
SNEHAL SHINDE 
SUBMITTED BY-VRUTTIKA 
HANDE 
JAGRUTI WARE
AIM and OBJECTIVE 
• The purpose of network security is essentially to prevent loss, 
through misuse of data 
• There are many attacks which attacks on the nw system. 
Basically we are focusing on pharming 
attacks 
• The main objective of our project is to analyze the attack with 
the help of java 
• Pharming attacks is analyzed with the help of java
The number of pharming attacks are increased now a days and we need to prevent these attacks such 
that the user wont loss its own confidential information. The pharming attack is an enhanced version of 
phishing attack and it is very important to prevent these pharming attacks. The main idea is to detect 
pharming attack using multiple server responses, by performing a dual step analysis composed 
• An IP address check of visited domain 
• A web page content comparison of a displayed web page against a reference web page:- 
In this step we are using two approaches 
1. Character Approach-With the help of N-gram algorithm where character wise comparison is done 
2. Word Approach-With the help of N-gram algorithm where word to word comparison is done between 
legitimate and fraudulent page.
PHARMING ATTACK
Block Diagram Of Proposed System
Requirement gathering and analysis 
System Design 
Implementation 
Testing 
Development Of System 
Maintainenmce
TECHNOLOGY USED:- 
JAVA 
Now-a-days all are familiar with Internet, the worldwide network of computers, which 
connects together thousands of computer all over the world. These network 
connections are increasing day by day in a rapid rate, so the network traffic is 
increasing at a pulse rate. Computers connected to the net are from many different 
manufacturers, running on different operating systems and they differ in architecture, 
computing power and capacity. By considering this point SUN Microsystems 
Corporation felt the need for a new programming language suitable for this 
heterogeneous Environment and java was the solution. This breaks barriers between 
different computers, chips and operating systems. Using java your application become 
compatible with all operating systems. 
FEATURES OF JAVA: 
• Simple 
• Secure 
• Portable 
• Object oriented 
• Robust 
• Multithreaded
CONCLUSION 
To avoid the 
attacking of fake 
side an preventing

Pharming attack

  • 1.
    BHARATI VIDYAPEETH INSTITUTEOF TECHNOLOGY KHARGHAR DEPARTMENT OF COMPUTER TECHNOLOGY YEAR 2013-2014 SYNOPSIS ON “AN ADVANCED TECHNIQUE FOR ANALYZING AND PREVENTING PHARMING ATTACKS ON HYBRID NETWORK UNDER THE GUIDANCE OF SNEHAL SHINDE SUBMITTED BY-VRUTTIKA HANDE JAGRUTI WARE
  • 2.
    AIM and OBJECTIVE • The purpose of network security is essentially to prevent loss, through misuse of data • There are many attacks which attacks on the nw system. Basically we are focusing on pharming attacks • The main objective of our project is to analyze the attack with the help of java • Pharming attacks is analyzed with the help of java
  • 3.
    The number ofpharming attacks are increased now a days and we need to prevent these attacks such that the user wont loss its own confidential information. The pharming attack is an enhanced version of phishing attack and it is very important to prevent these pharming attacks. The main idea is to detect pharming attack using multiple server responses, by performing a dual step analysis composed • An IP address check of visited domain • A web page content comparison of a displayed web page against a reference web page:- In this step we are using two approaches 1. Character Approach-With the help of N-gram algorithm where character wise comparison is done 2. Word Approach-With the help of N-gram algorithm where word to word comparison is done between legitimate and fraudulent page.
  • 4.
  • 5.
    Block Diagram OfProposed System
  • 6.
    Requirement gathering andanalysis System Design Implementation Testing Development Of System Maintainenmce
  • 7.
    TECHNOLOGY USED:- JAVA Now-a-days all are familiar with Internet, the worldwide network of computers, which connects together thousands of computer all over the world. These network connections are increasing day by day in a rapid rate, so the network traffic is increasing at a pulse rate. Computers connected to the net are from many different manufacturers, running on different operating systems and they differ in architecture, computing power and capacity. By considering this point SUN Microsystems Corporation felt the need for a new programming language suitable for this heterogeneous Environment and java was the solution. This breaks barriers between different computers, chips and operating systems. Using java your application become compatible with all operating systems. FEATURES OF JAVA: • Simple • Secure • Portable • Object oriented • Robust • Multithreaded
  • 8.
    CONCLUSION To avoidthe attacking of fake side an preventing