SlideShare a Scribd company logo
PHISHING WEBSITE DETECTION
GUIDE NAME :C.SAKUNTHALA M.E..,
SUBMITTED BY
ABINAYA S 812819205002
ARUL VINCENT RAJ A 812819205008
SAHANA BANU B 812819205023
OBJECTIVE
• Objective of the proposed project is to detects Malicious or Fake URLs to prevent
the users accessing from Unsafe URLs.
• Also provide secure encryption method to encrypt the user search data before
stored on the server.
INTRODUCTION
• Phishing imitates the characteristics and features of emails and makes it look the same as
the original one. It appears similar to that of the legitimate source.
• The user thinks that this email has come from a genuine company or an organisation.
This makes the user to forcefully visit the phishing website through the links given in the
phishing email.
• These phishing websites are made to mock the appearance of an original organisation
website.
• The phishers force user to fill up the personal information by giving alarming messages
or validate account messages etc..
ABSTRACT
• The user’s browsing data are used to extract valuable information about users interest. These data
are under the risk of being exposed to third parties. Proposed a model which encrypts the user’s
search data. Prevents privacy of data from both outside analysts and the intermediate server. It also
supports unsafe URL detection, to prevent users from accessing malicious URL. AES algorithm is
used for encrypting and decrypting user’s browsing data.
EXISTING SYSTEM
• PhishSim as a tool to effectively detect slightly modified or near-similar phishing websites using
prototype-based learning algorithms.
• The Normalized Compression Distance, which is a parameter-free and application independent
distance metric to measure similarities between websites’ HTML content.
• This tool works by measuring the pairwise similarity between websites in the dataset, clustering
these websites.
• Performing phishing classifications based on whether a website is grouped in the same cluster with
a known phishing website.
ISSUES IN THE EXISTING SYSTEM
• Creating metadata of URLs fails when the server receives multiple prefixes for a URL.
• Only capable of detecting trained URL.
• Multiple prefix matching can reduce the uncertainty of URL re-identification.
• Does not support for large dataset classification for accurate detection of phishing
website.
PROPOSED SYSTEM
• The major detection process is checking the URL to be visited by a user with the records in an encrypted
blacklist.
• The major detection process is checking the URL to be visited by a user with the records in an encrypted
blacklist.
• Support Vector Machine: Used for Classifying safe and unsafe URLs.
• Once a match is found (i.e., the URL is unsafe), the corresponding web page will not be loaded and also
provide safe URL details based on user’s search history.
• Also provide keyword based malicious detection using predefined keyword set.
• Users’ search URL data are encrypted first using RSA algorithm and then stored in intermediate server.
ADVANTAGES
• Provide the security to user searching data .
• Encrypt user viewed history .
• Allow only trained normal website .
• Block the url in the block storage
SYSTEM REQUIREMENTS
• Hardware Requirements
• Processor - Dual core processor 2.6.0 GHZ
• RAM - 1GB
• Hard disk - 160 GB
• Compact Disk - 650 Mb
• Keyboard - Standard keyboard
• Monitor - 15 inch color monitor
SYSTEM REQUIREMENTS
• Software Requirements
• Operating system - Windows OS
• Front End - ASP.NET
• Back End - SQL SERVER
• Application - Web Application
• Tool - Visual Studio 2010
BLOCK DIAGRAM
MODULE DECOMPOSITION
• Framework Construction
• User Registration and Login
• URL Search
• Unsafe URL Detection
• Search URL Encryption
• Access Search History
• Feedback System
MODULE DESCRIPTION
• Framework Construction
• Admin can set the framework to support efficient URL matching and unsafe URL
detection process.
• In this application, the URL data are converted into encrypted format.
• Black list should contain the unsafe URL’s with keywords.
• This will help to prevent from user search data leakage and malicious website access
on server.
MODULE DESCRIPTION
• User Registration and Login
• The user enrollment manages the user registration and login process with the help of
web server.
• Registration process collects the user details and stored on the data base.
• The login phase verifies the username and password.
• If the value match into the server data base then login to the account.
• Otherwise can’t access the user account.
• The server totally monitoring the user activity.
MODULE DESCRIPTION
• URL Search
• User can search data using URL or Specified Keyword.
• The verification of URLs and keywords is very essential in order to ensure that user
should be prevented from visiting malicious websites.
• SVM mechanisms have been proposed to detect the malicious URLs.
• One of the basic features that a mechanism should posses is to allow the fake URLs
that are requested by the client and prevent the malicious URLs before reaching the
user.
• This is achieved by notifying the user that it was a malicious website.
MODULE DESCRIPTION
• Unsafe URL Detection
• This proposed framework uses SVM classification models to detect a malicious URL
and categorize the malicious URL as one of a phishing URL.
• The techniques extract features associated with the known URLs, and use the
machine learning algorithms to train the unknown malicious URL.
• Here, the new URL will be matched and tested with every previously known
malicious URL in the black list.
• This also allows users to provide suggestions to add malicious URLs.
MODULE DESCRIPTION
• Search URL Encryption
• User could search the data through this website.
• The URL of searched data transmitted to server in secure manner.
• URL has converted into encrypted format using Homomorphic RSA encryption
process.
• Then the encrypted details are shared to server for identification.
MODULE DESCRIPTION
• Access Search History
• This module explains about search data retrieval.
• Users are allowed to view their search history in secure manner.
• Users first need to authenticate using their username and password.
• Then they get OTP in SMS format, that will helps to decrypting the URL
data.
MODULE DESCRIPTION
• Feedback System
• Feedback system helps to overcome the problems faced by user during web search
process.
• User can send their feedback regarding, search efficiency.
• Also they will be allowed to provide suggestion for adding further URLs in blacklist.
• Admin can view URL suggestion provided by user, and add the malicious URLs in
blacklist.
• This helps to enhance the performance of blacklist storage in phishing detection.
ALGORITHM
• RSA Algorithm
• RSA algorithm is an asymmetric cryptography algorithm.
• Asymmetric actually means that it works on two different keys i.e. Public
Key and Private Key.
• As the name describes that the Public Key is given to everyone and the Private key is
kept private.
ALGORITHM
• Homomorphic RSA Encryption
• Key Generation Process
• Step 1: Generate two large random primes, p and q, of approximately equal size such that their product n=pq is of the
required bit length, e.g. 1024 bits.
• Step 2: Compute n=pq and ϕ=(p−1)(q−1).
• Step 3: Choose an integer e, 1<e<ϕ, such that gcd (e,ϕ) = 1.
• Step 4: Compute the secret exponent d, 1<d<ϕ, such that ed≡1modϕ.
• The public key is (n,e) and the private key (d,p,q). Keep all the values d, p, q and ϕ secret.
• n is known as the modulus.
• e is known as the public exponent or encryption exponent or just the exponent.
• d is known as the secret exponent or decryption exponent.
ALGORITHM
• Encryption
• Step 1: Obtains the recipient B's public key (n,e).
• Step 2: Represents the plaintext message as a positive integer mm with 1<m<n.
• Step 3: Computes the ciphertext c =
• Step 4: Sends the ciphertext cc to B.
• Decryption
• Recipient B does the following:-
• Step1: Uses his private key (n,d) to compute m=
• Step 2: Extracts the plaintext from the message representative mm.
ALGORITHM
• Support Vector Machine (SVM)
• Support Vector Machine (SVM) is a supervised algorithm based on machine learning
• In this work, plot each data item as a point in n-dimensional space with the value of every feature
being the count of a particular coordinate.
• Then, we perform classification by finding the hyper-plane that differentiates the two classes very
well.
• Support Vectors are simply the co-ordinates of individual observation.
• Support Vector Machine is best for segregates the two classes (hyper-plane/ line).
• The hyperplane is the line with the biggest margin to both groups.
CONCLUSION
• The proposed model ensures that the users’ search URL data is completely privacy
preserved.
• Using asymmetric key encryption concept like RSA algorithm and differential privacy
makes sure that no one can predict the users’ interest.
• It avoids the access of malicious websites.
SCREEN SHOT
Admin login page
SCREEN SHOT
Training page
SCREEN SHOT
New user login
SCREEN SHOT
url searching page
SCREEN SHOT
Alert page
SCREEN SHOT
View history
SCREEN SHOT
Feed back page
REFERENCES
• [1] Ahammad, SK Hasane, Sunil D. Kale, Gopal D. Upadhye, Sandeep Dwarkanath Pande, E. Venkatesh Babu, Amol V.
Dhumane, and Mr Dilip Kumar Jang Bahadur. "Phishing URL detection using machine learning methods." Advances in
Engineering Software 173 (2022): 103288
• [2] Butnaru, Andrei, AlexiosMylonas, And Nikolaos Pitropakis. "Towards Lightweight Url-Based Phishing
Detection." Future Internet 13, No. 6 (2021): 154
• [3] Butt, Muhammad Hassaan Farooq, Jian Ping Li, Tehreem Saboor, Muhammad Arslan, And Muhammad Adnan
Farooq Butt. "Intelligent Phishing Url Detection: A Solution Based On Deep Learning Framework." In 2021 18th
International Computer Conference On Wavelet Active Media Technology And Information Processing
(Iccwamtip), Pp. 434-439. Ieee, 2021.
• [4] Mourtaji, Youness, Mohammed Bouhorma, Daniyal Alghazzawi, Ghadah Aldabbagh, And Abdullah Alghamdi.
"Hybrid Rule-Based Solution for Phishing Url Detection Using Convolutional Neural Network." Wireless
Communications And Mobile Computing 2021 (2021): 1-24.
• [5] Odeh, Ammar, Ismail Keshta, And Eman Abdelfattah. "Machine Learning techniques for Detection Of Website
Phishing: A Review For Promises And Challenges." In 2021 Ieee 11th Annual Computing And Communication
Workshop And Conference (Ccwc), Pp. 0813-0818. Ieee, 2021.

More Related Content

Similar to PHISHING URL - Review 1.pptx

Portal and Intranets
Portal and Intranets Portal and Intranets
Portal and Intranets
Redar Ismail
 
privacy-preserving multi-keyword ranked search
privacy-preserving multi-keyword ranked searchprivacy-preserving multi-keyword ranked search
privacy-preserving multi-keyword ranked search
swathi78
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
Shubham Takode
 
Joomla web application development vulnerabilities
Joomla web application development vulnerabilitiesJoomla web application development vulnerabilities
Joomla web application development vulnerabilities
BlazeDream Technologies Pvt Ltd
 
Extending drupal authentication
Extending drupal authenticationExtending drupal authentication
Extending drupal authentication
Charles Russell
 
State of Florida Neo4j Graph Briefing - Cyber IAM
State of Florida Neo4j Graph Briefing - Cyber IAMState of Florida Neo4j Graph Briefing - Cyber IAM
State of Florida Neo4j Graph Briefing - Cyber IAM
Neo4j
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
Agile Testing Alliance
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajan
Akash Mahajan
 
How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top Ten
Security Innovation
 
Cache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure ApplicationsCache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure Applications
InterSystems Corporation
 
semantic search
semantic searchsemantic search
semantic search
SaikiranK15
 
Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1
Ashnikbiz
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Shakas Technologies
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
Joff Thyer
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Michael Pirnat
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
Shantanu Sharma
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
Novell
 
Introduction to Web Application Security Principles
Introduction to Web Application Security Principles Introduction to Web Application Security Principles
Introduction to Web Application Security Principles
Dr. P. Mohana Priya
 

Similar to PHISHING URL - Review 1.pptx (20)

Portal and Intranets
Portal and Intranets Portal and Intranets
Portal and Intranets
 
privacy-preserving multi-keyword ranked search
privacy-preserving multi-keyword ranked searchprivacy-preserving multi-keyword ranked search
privacy-preserving multi-keyword ranked search
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
Joomla web application development vulnerabilities
Joomla web application development vulnerabilitiesJoomla web application development vulnerabilities
Joomla web application development vulnerabilities
 
Extending drupal authentication
Extending drupal authenticationExtending drupal authentication
Extending drupal authentication
 
State of Florida Neo4j Graph Briefing - Cyber IAM
State of Florida Neo4j Graph Briefing - Cyber IAMState of Florida Neo4j Graph Briefing - Cyber IAM
State of Florida Neo4j Graph Briefing - Cyber IAM
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajan
 
How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top Ten
 
Cache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure ApplicationsCache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure Applications
 
semantic search
semantic searchsemantic search
semantic search
 
Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
Introduction to Web Application Security Principles
Introduction to Web Application Security Principles Introduction to Web Application Security Principles
Introduction to Web Application Security Principles
 

Recently uploaded

DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 

Recently uploaded (20)

DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 

PHISHING URL - Review 1.pptx

  • 1. PHISHING WEBSITE DETECTION GUIDE NAME :C.SAKUNTHALA M.E.., SUBMITTED BY ABINAYA S 812819205002 ARUL VINCENT RAJ A 812819205008 SAHANA BANU B 812819205023
  • 2. OBJECTIVE • Objective of the proposed project is to detects Malicious or Fake URLs to prevent the users accessing from Unsafe URLs. • Also provide secure encryption method to encrypt the user search data before stored on the server.
  • 3. INTRODUCTION • Phishing imitates the characteristics and features of emails and makes it look the same as the original one. It appears similar to that of the legitimate source. • The user thinks that this email has come from a genuine company or an organisation. This makes the user to forcefully visit the phishing website through the links given in the phishing email. • These phishing websites are made to mock the appearance of an original organisation website. • The phishers force user to fill up the personal information by giving alarming messages or validate account messages etc..
  • 4. ABSTRACT • The user’s browsing data are used to extract valuable information about users interest. These data are under the risk of being exposed to third parties. Proposed a model which encrypts the user’s search data. Prevents privacy of data from both outside analysts and the intermediate server. It also supports unsafe URL detection, to prevent users from accessing malicious URL. AES algorithm is used for encrypting and decrypting user’s browsing data.
  • 5. EXISTING SYSTEM • PhishSim as a tool to effectively detect slightly modified or near-similar phishing websites using prototype-based learning algorithms. • The Normalized Compression Distance, which is a parameter-free and application independent distance metric to measure similarities between websites’ HTML content. • This tool works by measuring the pairwise similarity between websites in the dataset, clustering these websites. • Performing phishing classifications based on whether a website is grouped in the same cluster with a known phishing website.
  • 6. ISSUES IN THE EXISTING SYSTEM • Creating metadata of URLs fails when the server receives multiple prefixes for a URL. • Only capable of detecting trained URL. • Multiple prefix matching can reduce the uncertainty of URL re-identification. • Does not support for large dataset classification for accurate detection of phishing website.
  • 7. PROPOSED SYSTEM • The major detection process is checking the URL to be visited by a user with the records in an encrypted blacklist. • The major detection process is checking the URL to be visited by a user with the records in an encrypted blacklist. • Support Vector Machine: Used for Classifying safe and unsafe URLs. • Once a match is found (i.e., the URL is unsafe), the corresponding web page will not be loaded and also provide safe URL details based on user’s search history. • Also provide keyword based malicious detection using predefined keyword set. • Users’ search URL data are encrypted first using RSA algorithm and then stored in intermediate server.
  • 8. ADVANTAGES • Provide the security to user searching data . • Encrypt user viewed history . • Allow only trained normal website . • Block the url in the block storage
  • 9. SYSTEM REQUIREMENTS • Hardware Requirements • Processor - Dual core processor 2.6.0 GHZ • RAM - 1GB • Hard disk - 160 GB • Compact Disk - 650 Mb • Keyboard - Standard keyboard • Monitor - 15 inch color monitor
  • 10. SYSTEM REQUIREMENTS • Software Requirements • Operating system - Windows OS • Front End - ASP.NET • Back End - SQL SERVER • Application - Web Application • Tool - Visual Studio 2010
  • 12. MODULE DECOMPOSITION • Framework Construction • User Registration and Login • URL Search • Unsafe URL Detection • Search URL Encryption • Access Search History • Feedback System
  • 13. MODULE DESCRIPTION • Framework Construction • Admin can set the framework to support efficient URL matching and unsafe URL detection process. • In this application, the URL data are converted into encrypted format. • Black list should contain the unsafe URL’s with keywords. • This will help to prevent from user search data leakage and malicious website access on server.
  • 14. MODULE DESCRIPTION • User Registration and Login • The user enrollment manages the user registration and login process with the help of web server. • Registration process collects the user details and stored on the data base. • The login phase verifies the username and password. • If the value match into the server data base then login to the account. • Otherwise can’t access the user account. • The server totally monitoring the user activity.
  • 15. MODULE DESCRIPTION • URL Search • User can search data using URL or Specified Keyword. • The verification of URLs and keywords is very essential in order to ensure that user should be prevented from visiting malicious websites. • SVM mechanisms have been proposed to detect the malicious URLs. • One of the basic features that a mechanism should posses is to allow the fake URLs that are requested by the client and prevent the malicious URLs before reaching the user. • This is achieved by notifying the user that it was a malicious website.
  • 16. MODULE DESCRIPTION • Unsafe URL Detection • This proposed framework uses SVM classification models to detect a malicious URL and categorize the malicious URL as one of a phishing URL. • The techniques extract features associated with the known URLs, and use the machine learning algorithms to train the unknown malicious URL. • Here, the new URL will be matched and tested with every previously known malicious URL in the black list. • This also allows users to provide suggestions to add malicious URLs.
  • 17. MODULE DESCRIPTION • Search URL Encryption • User could search the data through this website. • The URL of searched data transmitted to server in secure manner. • URL has converted into encrypted format using Homomorphic RSA encryption process. • Then the encrypted details are shared to server for identification.
  • 18. MODULE DESCRIPTION • Access Search History • This module explains about search data retrieval. • Users are allowed to view their search history in secure manner. • Users first need to authenticate using their username and password. • Then they get OTP in SMS format, that will helps to decrypting the URL data.
  • 19. MODULE DESCRIPTION • Feedback System • Feedback system helps to overcome the problems faced by user during web search process. • User can send their feedback regarding, search efficiency. • Also they will be allowed to provide suggestion for adding further URLs in blacklist. • Admin can view URL suggestion provided by user, and add the malicious URLs in blacklist. • This helps to enhance the performance of blacklist storage in phishing detection.
  • 20. ALGORITHM • RSA Algorithm • RSA algorithm is an asymmetric cryptography algorithm. • Asymmetric actually means that it works on two different keys i.e. Public Key and Private Key. • As the name describes that the Public Key is given to everyone and the Private key is kept private.
  • 21. ALGORITHM • Homomorphic RSA Encryption • Key Generation Process • Step 1: Generate two large random primes, p and q, of approximately equal size such that their product n=pq is of the required bit length, e.g. 1024 bits. • Step 2: Compute n=pq and ϕ=(p−1)(q−1). • Step 3: Choose an integer e, 1<e<ϕ, such that gcd (e,ϕ) = 1. • Step 4: Compute the secret exponent d, 1<d<ϕ, such that ed≡1modϕ. • The public key is (n,e) and the private key (d,p,q). Keep all the values d, p, q and ϕ secret. • n is known as the modulus. • e is known as the public exponent or encryption exponent or just the exponent. • d is known as the secret exponent or decryption exponent.
  • 22. ALGORITHM • Encryption • Step 1: Obtains the recipient B's public key (n,e). • Step 2: Represents the plaintext message as a positive integer mm with 1<m<n. • Step 3: Computes the ciphertext c = • Step 4: Sends the ciphertext cc to B. • Decryption • Recipient B does the following:- • Step1: Uses his private key (n,d) to compute m= • Step 2: Extracts the plaintext from the message representative mm.
  • 23. ALGORITHM • Support Vector Machine (SVM) • Support Vector Machine (SVM) is a supervised algorithm based on machine learning • In this work, plot each data item as a point in n-dimensional space with the value of every feature being the count of a particular coordinate. • Then, we perform classification by finding the hyper-plane that differentiates the two classes very well. • Support Vectors are simply the co-ordinates of individual observation. • Support Vector Machine is best for segregates the two classes (hyper-plane/ line). • The hyperplane is the line with the biggest margin to both groups.
  • 24. CONCLUSION • The proposed model ensures that the users’ search URL data is completely privacy preserved. • Using asymmetric key encryption concept like RSA algorithm and differential privacy makes sure that no one can predict the users’ interest. • It avoids the access of malicious websites.
  • 32. REFERENCES • [1] Ahammad, SK Hasane, Sunil D. Kale, Gopal D. Upadhye, Sandeep Dwarkanath Pande, E. Venkatesh Babu, Amol V. Dhumane, and Mr Dilip Kumar Jang Bahadur. "Phishing URL detection using machine learning methods." Advances in Engineering Software 173 (2022): 103288 • [2] Butnaru, Andrei, AlexiosMylonas, And Nikolaos Pitropakis. "Towards Lightweight Url-Based Phishing Detection." Future Internet 13, No. 6 (2021): 154 • [3] Butt, Muhammad Hassaan Farooq, Jian Ping Li, Tehreem Saboor, Muhammad Arslan, And Muhammad Adnan Farooq Butt. "Intelligent Phishing Url Detection: A Solution Based On Deep Learning Framework." In 2021 18th International Computer Conference On Wavelet Active Media Technology And Information Processing (Iccwamtip), Pp. 434-439. Ieee, 2021. • [4] Mourtaji, Youness, Mohammed Bouhorma, Daniyal Alghazzawi, Ghadah Aldabbagh, And Abdullah Alghamdi. "Hybrid Rule-Based Solution for Phishing Url Detection Using Convolutional Neural Network." Wireless Communications And Mobile Computing 2021 (2021): 1-24. • [5] Odeh, Ammar, Ismail Keshta, And Eman Abdelfattah. "Machine Learning techniques for Detection Of Website Phishing: A Review For Promises And Challenges." In 2021 Ieee 11th Annual Computing And Communication Workshop And Conference (Ccwc), Pp. 0813-0818. Ieee, 2021.