SlideShare a Scribd company logo
SRI KRISHNADEVARAYA UNIVERSITY
Dept. of Computer Science & Technology
Anantapuramu – 515003
INTELLIGENT PHISHING WEBSITE
DETECTION AND PREVENTION SYSTEM
A project report on
By
g.NARESH
M.Sc.
Dept. Of Computer Science & Technology
Under the esteemed guidance of
Dr. N. Geethanjali
M.Sc., M.Phil.,M.Tech.,P.hD.
Professor
Abstract
Phishing is a new type of network attack where the attacker creates
a replica of an existing web page to fool users in to submitting
personal, financial, or password data to what they think is their
service provider’s website .The concept is a end host based anti-
phishing algorithm, called the Link Guard, by utilizing the generic
characteristics of the hyperlinks in phishing attacks. Link Guard is
based on the careful analysis of the characteristics of phishing
hyperlinks.
Each end user is implemented with Link Guard algorithm. After
doing so the end user recognizes the phishing emails and can avoid
responding to such mails. Since Link Guard is characteristics based it
can detect and prevent not only known phishing attacks but also
unknown ones.
PHISHING BASICS
Pronounced "fishing“
The word has its Origin from two words “Password Harvesting ”
or fishing for Passwords
Phishing is an online form of pretexting, a kind of deception in
which an attacker pretends to be someone else in order to obtain
sensitive information from the victim
 Also known as "brand spoofing“
Phishers are phishing artists
OBJECTIVES:
Phishing objectives analysis and identified that the phishing
hyperlinks share one or more characteristics:
 The visual link and the actual link are not the same;
 The attackers often use dotted decimal IP address instead of
DNS name;
 Special tricks are used to encode the hyperlinks maliciously;
 The attackers often use fake DNS names that are similar with
target website
SOFTWARE MODEL:
Software Development Life Cycle (SDLC) is a process used by the
software industry to design, develop and test high quality
software. The SDLC aims to produce high quality software that
meets or exceeds customer expectations, reaches completion
within times and cost estimates.
 SDLC is the acronym of Software Development Life Cycle.
 It is also called as Software Development Process.
 SDLC is a framework defining tasks performed at each step
in the software development process.
 ISO/IEC 12207 is an international standard for software life-
cycle processes. It aims to be the standard that defines all the
tasks required for developing and
maintaining software.
Planning
Defining
Designing
Building
Testing
Development
What is SDLC?
SDLC is a process followed for a software project, within a software
organization. It consists of a detailed plan describing how to
develop, maintain, replace and alter or enhance specific software.
The life cycle defines a methodology for improving the quality of
software and the overall development process.
PURPOSE OF THE PROJECT
The word ‘Phishing’ initially emerged in 1990s. The early hackers often use ‘ph’ to
replace ‘f’ to produce new words in the hacker’s community, since they usually hack by
phones. Phishing is a new word produced from ‘fishing’, it refers to the act that the
attacker allure users to visit a faked Web site by sending them faked e-mails.
If you input the account number and password, the attackers then successfully collect
the information at the server side, and is able to perform their next step actions with
that information.
Our analysis identifies that the phishing hyperlinks share one or more characteristics
as listed below:
1) The visual link and the actual link are not the same;
2) The attackers often use dotted decimal IP address instead of DNS name;
3) Special tricks are used to encode the hyperlinks maliciously;
4) The attackers often use fake DNS names that are similar (but not identical) with the
target Web site. We then propose an end-host based anti-phishing algorithm which
we call Link Guard, based on the characteristics of the phishing hyperlink.
EXISTING SYSTEM:
Detect and block the phishing Web sites
in time.
Enhance the security of the web sites.
Block the phishing e-mails by various
spam filters.
Install online anti-phishing software in
user’s computers.
PROPOSED SYSTEM:
Classification of the hyperlinks in the
phishing e-mails
Link guard algorithm
Link guard implemented client
Feasibility study
Operating System : Windows 2000/XP
Documentation Tool : Ms Word
Technologies : JDBC, Servlets & JSP
Data Base : MySQL
Hard disk : 20 GB and above
RAM : 256 MB and above
Processor speed : 1.6 GHz and above
SOFTWARE REQUIREMENTS
HARDWARE REQUIREMENTS
HOW TO AVOID PHISHING
Never send sensitive account information by e-mail
◦ Account numbers, SSN, passwords
Never give any password out to anyone
Verify any person who contacts you (phone or email).
◦ If someone calls you on a sensitive topic, thank
them, hang up and call them back using a
number that you know is correct, like from your
credit card or statement.
ARCHITECTURE DESIGN
This explains the entire architecture of the software being developed and shows
how the flow control is passed over each module in the project.
Primary objective of architecture design is to develop a modular program
structure and represent the control relationships between modules.
USER
LINKGUARD
MAIL SYSTEM
URL & DOMAIN
IDENTITY
COMPOSESEND/RECEIVE
MAIL SYSTEM REGISTRATION
PHISING
WEBSITE
The above architectural design contains different
modules like sender, receiver, and Link guard technique
methods.
 First register as user and that information is available
at Admin.
 The user will compose the mail and send to another
user.
 The user who will get the mail that can be checked
internally with Link guard Algorithm.
 If the mail is of phish then it will be moving to phish
box
 If the mail is not phishy then it will be in normal inbox
UML DIAGRAMS
Fig: Use case diagram
Class Diagram
Fig: Class diagram
Activity Diagram for Mail System
Activity Diagram for compose, send and receive mail
Overview of JAVA
Java technology is both a programming language and a platform.
Java is a powerful but lean object oriented programming language.
It has generated a lot of excitement because it makes it possible to
program for internet by creating applets, programs that can be
embedded in web page.
Java is actually a platform consisting of three components:
1. Java programming Language.
2. Java Library of Classes and Interfaces.
3. Java Virtual Machine.
JAVA DATABASE CONNECTIVITY
JDBC is a Java API for executing SQL statements. (JDBC is often
thought of as “Java Database Connectivity”) .It consists of a set of
classes and interfaces written in the java programming language.
Using JDBC, it is easy to send SQL statements to virtually
any relational database. In the other words, with the JDBC API, it is
not necessary to write to one program to access a Sybase
database, another program to access Informix database, another
program to access Oracle database, and so on. The combinations
of JAVA and JDBC let’s a programmer writes it once and run it
anywhere.
JAVA SERVER PAGES (JSP)
Java Server Pages™ (JSP) is a new technology for web application
development that has received a great deal of attention since it was
first announced.
A JSP is similar in design and functionality to java servlet. It is
called by the client to provide a web service, the nature of which
depends on the J2EE application.
Java Servlet is written using Java programming language and
responses are encoded as an output string object that is passed to
the println () method.
In contrast a JSP is written in HTML, XML, or in the client’s
format that is interspersed with scripting elements, directives,
and actions comprised of Java Programming language and JSP
syntax.
There are three methods that are automatically called when
the JSP is requested and the JSP terminates normally.
These are
the jspInt () method,
the jspDestroy () method, and
the service () method.
Comm.: This collects the information of the
input process, and sends these related
Information’s to the Analyzer.
Database: Store the white list, blacklist, and
the
user input URLs.
Analyzer: It is the key component of Link
Guard, which implements the Link Guard
Algorithm; it uses data provided by Comm and
Database, and sends the results to the Alert
and
Logger modules.
Alerter: When receiving warning messages
from Analyzer, it shows the related information
to alert the users and send back the reactions
of
the user back to the Analyzer.
Logger: Archive the history information, such
as user events, alert information, for future
use.
Link guard algorithm
TESTING
Testing is the process of detecting errors. Software testing is a
critical element of software quality assurance and represents the
ultimate review of specification, design and coding.
TESTING METHODS
System Testing
Code Testing
TYPES OF TESTING
Unit Testing
Link Testing
TEST RESULTS
The below shown are the project Inputs & Outputs which are
shown in a diagrammatical representation
Home page:
New User Sign UP:
CONCLUSION
Phishing has becoming a serious network security
problem, causing finical lose of billions of dollars to both consumers
and e-commerce companies. In this project, we have studied the
characteristics of the hyperlinks that were embedded in phishing e-
mails. Since Phishing Guard is characteristic based, it can not only
detect known attacks, but also is effective to the unknown ones.
We have implemented Link Guard for Windows XP.
Our experiment showed that Link Guard is light-weighted and can
detect up to 96% unknown phishing attacks in real-time. We believe
that Link Guard is not only useful for detecting phishing attacks, but
also can shield users from malicious or unsolicited links in Web pages
and Instant messages.
website phishing by NR

More Related Content

What's hot

Phishing
PhishingPhishing
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
Sanjay Kumar
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
Mohammad Reza Mousavinasr
 
Web security
Web securityWeb security
Web security
Padam Banthia
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Web security
Web securityWeb security
Web security
Muhammad Usman
 
Web security
Web securityWeb security
Web security
Jatin Grover
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
Pankaj Yadav
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
n|u - The Open Security Community
 
Phishing detection & protection scheme
Phishing detection & protection schemePhishing detection & protection scheme
Phishing detection & protection scheme
Mussavir Shaikh
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
Netsparker
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
Footprinting
FootprintingFootprinting
Footprinting
Duah John
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
SQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint PresentationSQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint Presentation
Rapid Purple
 
System Security
System SecuritySystem Security
System Security
Reddhi Basu
 

What's hot (20)

Phishing
PhishingPhishing
Phishing
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
 
Web security
Web securityWeb security
Web security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Web security
Web securityWeb security
Web security
 
Web security
Web securityWeb security
Web security
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Cyber security
Cyber securityCyber security
Cyber security
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
 
Phishing detection & protection scheme
Phishing detection & protection schemePhishing detection & protection scheme
Phishing detection & protection scheme
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Footprinting
FootprintingFootprinting
Footprinting
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
SQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint PresentationSQL Injections - A Powerpoint Presentation
SQL Injections - A Powerpoint Presentation
 
System Security
System SecuritySystem Security
System Security
 

Similar to website phishing by NR

icv
icvicv
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
PROP - P ATRONAGE OF  PHP W EB  A PPLICATIONSPROP - P ATRONAGE OF  PHP W EB  A PPLICATIONS
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
ijcsit
 
Fullstack Interview Questions and Answers.pdf
Fullstack Interview Questions and Answers.pdfFullstack Interview Questions and Answers.pdf
Fullstack Interview Questions and Answers.pdf
csvishnukumar
 
A security note for web developers
A security note for web developersA security note for web developers
A security note for web developers
John Ombagi
 
Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection Attack
IJRESJOURNAL
 
Introduction to Backend Development (1).pptx
Introduction to Backend Development (1).pptxIntroduction to Backend Development (1).pptx
Introduction to Backend Development (1).pptx
OsuGodbless
 
Resume
ResumeResume
Resume
Imran Raza
 
Routine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence FlawsRoutine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence Flaws
IJTET Journal
 
OFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDEROFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDER
IRJET Journal
 
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case StudyFinding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
DevOps.com
 
A26001006
A26001006A26001006
A26001006
IJERA Editor
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners
Checkmarx
 
Data Security in Fintech App Development: How PHP Can Help
Data Security in Fintech App Development: How PHP Can HelpData Security in Fintech App Development: How PHP Can Help
Data Security in Fintech App Development: How PHP Can Help
Narola Infotech
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
karthik menon
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET Journal
 
Software Birthmark Based Theft/Similarity Comparisons of JavaScript Programs
Software Birthmark Based Theft/Similarity Comparisons of JavaScript ProgramsSoftware Birthmark Based Theft/Similarity Comparisons of JavaScript Programs
Software Birthmark Based Theft/Similarity Comparisons of JavaScript Programs
Swati Patel
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET Journal
 
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning AttacksAlgorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
iosrjce
 
F017353539
F017353539F017353539
F017353539
IOSR Journals
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
Lucas Hendrich
 

Similar to website phishing by NR (20)

icv
icvicv
icv
 
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
PROP - P ATRONAGE OF  PHP W EB  A PPLICATIONSPROP - P ATRONAGE OF  PHP W EB  A PPLICATIONS
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
 
Fullstack Interview Questions and Answers.pdf
Fullstack Interview Questions and Answers.pdfFullstack Interview Questions and Answers.pdf
Fullstack Interview Questions and Answers.pdf
 
A security note for web developers
A security note for web developersA security note for web developers
A security note for web developers
 
Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection Attack
 
Introduction to Backend Development (1).pptx
Introduction to Backend Development (1).pptxIntroduction to Backend Development (1).pptx
Introduction to Backend Development (1).pptx
 
Resume
ResumeResume
Resume
 
Routine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence FlawsRoutine Detection Of Web Application Defence Flaws
Routine Detection Of Web Application Defence Flaws
 
OFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDEROFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDER
 
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case StudyFinding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
 
A26001006
A26001006A26001006
A26001006
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners
 
Data Security in Fintech App Development: How PHP Can Help
Data Security in Fintech App Development: How PHP Can HelpData Security in Fintech App Development: How PHP Can Help
Data Security in Fintech App Development: How PHP Can Help
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 
Software Birthmark Based Theft/Similarity Comparisons of JavaScript Programs
Software Birthmark Based Theft/Similarity Comparisons of JavaScript ProgramsSoftware Birthmark Based Theft/Similarity Comparisons of JavaScript Programs
Software Birthmark Based Theft/Similarity Comparisons of JavaScript Programs
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
 
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning AttacksAlgorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
 
F017353539
F017353539F017353539
F017353539
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 

Recently uploaded

Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 

Recently uploaded (20)

Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 

website phishing by NR

  • 1. SRI KRISHNADEVARAYA UNIVERSITY Dept. of Computer Science & Technology Anantapuramu – 515003
  • 2. INTELLIGENT PHISHING WEBSITE DETECTION AND PREVENTION SYSTEM A project report on By g.NARESH M.Sc. Dept. Of Computer Science & Technology Under the esteemed guidance of Dr. N. Geethanjali M.Sc., M.Phil.,M.Tech.,P.hD. Professor
  • 3. Abstract Phishing is a new type of network attack where the attacker creates a replica of an existing web page to fool users in to submitting personal, financial, or password data to what they think is their service provider’s website .The concept is a end host based anti- phishing algorithm, called the Link Guard, by utilizing the generic characteristics of the hyperlinks in phishing attacks. Link Guard is based on the careful analysis of the characteristics of phishing hyperlinks. Each end user is implemented with Link Guard algorithm. After doing so the end user recognizes the phishing emails and can avoid responding to such mails. Since Link Guard is characteristics based it can detect and prevent not only known phishing attacks but also unknown ones.
  • 4. PHISHING BASICS Pronounced "fishing“ The word has its Origin from two words “Password Harvesting ” or fishing for Passwords Phishing is an online form of pretexting, a kind of deception in which an attacker pretends to be someone else in order to obtain sensitive information from the victim  Also known as "brand spoofing“ Phishers are phishing artists
  • 5. OBJECTIVES: Phishing objectives analysis and identified that the phishing hyperlinks share one or more characteristics:  The visual link and the actual link are not the same;  The attackers often use dotted decimal IP address instead of DNS name;  Special tricks are used to encode the hyperlinks maliciously;  The attackers often use fake DNS names that are similar with target website
  • 6. SOFTWARE MODEL: Software Development Life Cycle (SDLC) is a process used by the software industry to design, develop and test high quality software. The SDLC aims to produce high quality software that meets or exceeds customer expectations, reaches completion within times and cost estimates.  SDLC is the acronym of Software Development Life Cycle.  It is also called as Software Development Process.  SDLC is a framework defining tasks performed at each step in the software development process.  ISO/IEC 12207 is an international standard for software life- cycle processes. It aims to be the standard that defines all the tasks required for developing and maintaining software.
  • 7. Planning Defining Designing Building Testing Development What is SDLC? SDLC is a process followed for a software project, within a software organization. It consists of a detailed plan describing how to develop, maintain, replace and alter or enhance specific software. The life cycle defines a methodology for improving the quality of software and the overall development process.
  • 8. PURPOSE OF THE PROJECT The word ‘Phishing’ initially emerged in 1990s. The early hackers often use ‘ph’ to replace ‘f’ to produce new words in the hacker’s community, since they usually hack by phones. Phishing is a new word produced from ‘fishing’, it refers to the act that the attacker allure users to visit a faked Web site by sending them faked e-mails. If you input the account number and password, the attackers then successfully collect the information at the server side, and is able to perform their next step actions with that information. Our analysis identifies that the phishing hyperlinks share one or more characteristics as listed below: 1) The visual link and the actual link are not the same; 2) The attackers often use dotted decimal IP address instead of DNS name; 3) Special tricks are used to encode the hyperlinks maliciously; 4) The attackers often use fake DNS names that are similar (but not identical) with the target Web site. We then propose an end-host based anti-phishing algorithm which we call Link Guard, based on the characteristics of the phishing hyperlink.
  • 9. EXISTING SYSTEM: Detect and block the phishing Web sites in time. Enhance the security of the web sites. Block the phishing e-mails by various spam filters. Install online anti-phishing software in user’s computers.
  • 10. PROPOSED SYSTEM: Classification of the hyperlinks in the phishing e-mails Link guard algorithm Link guard implemented client Feasibility study
  • 11. Operating System : Windows 2000/XP Documentation Tool : Ms Word Technologies : JDBC, Servlets & JSP Data Base : MySQL Hard disk : 20 GB and above RAM : 256 MB and above Processor speed : 1.6 GHz and above SOFTWARE REQUIREMENTS HARDWARE REQUIREMENTS
  • 12. HOW TO AVOID PHISHING Never send sensitive account information by e-mail ◦ Account numbers, SSN, passwords Never give any password out to anyone Verify any person who contacts you (phone or email). ◦ If someone calls you on a sensitive topic, thank them, hang up and call them back using a number that you know is correct, like from your credit card or statement.
  • 13. ARCHITECTURE DESIGN This explains the entire architecture of the software being developed and shows how the flow control is passed over each module in the project. Primary objective of architecture design is to develop a modular program structure and represent the control relationships between modules. USER LINKGUARD MAIL SYSTEM URL & DOMAIN IDENTITY COMPOSESEND/RECEIVE MAIL SYSTEM REGISTRATION PHISING WEBSITE
  • 14. The above architectural design contains different modules like sender, receiver, and Link guard technique methods.  First register as user and that information is available at Admin.  The user will compose the mail and send to another user.  The user who will get the mail that can be checked internally with Link guard Algorithm.  If the mail is of phish then it will be moving to phish box  If the mail is not phishy then it will be in normal inbox
  • 15. UML DIAGRAMS Fig: Use case diagram
  • 17. Activity Diagram for Mail System
  • 18. Activity Diagram for compose, send and receive mail
  • 19. Overview of JAVA Java technology is both a programming language and a platform. Java is a powerful but lean object oriented programming language. It has generated a lot of excitement because it makes it possible to program for internet by creating applets, programs that can be embedded in web page. Java is actually a platform consisting of three components: 1. Java programming Language. 2. Java Library of Classes and Interfaces. 3. Java Virtual Machine.
  • 20. JAVA DATABASE CONNECTIVITY JDBC is a Java API for executing SQL statements. (JDBC is often thought of as “Java Database Connectivity”) .It consists of a set of classes and interfaces written in the java programming language. Using JDBC, it is easy to send SQL statements to virtually any relational database. In the other words, with the JDBC API, it is not necessary to write to one program to access a Sybase database, another program to access Informix database, another program to access Oracle database, and so on. The combinations of JAVA and JDBC let’s a programmer writes it once and run it anywhere.
  • 21. JAVA SERVER PAGES (JSP) Java Server Pages™ (JSP) is a new technology for web application development that has received a great deal of attention since it was first announced. A JSP is similar in design and functionality to java servlet. It is called by the client to provide a web service, the nature of which depends on the J2EE application.
  • 22. Java Servlet is written using Java programming language and responses are encoded as an output string object that is passed to the println () method. In contrast a JSP is written in HTML, XML, or in the client’s format that is interspersed with scripting elements, directives, and actions comprised of Java Programming language and JSP syntax. There are three methods that are automatically called when the JSP is requested and the JSP terminates normally. These are the jspInt () method, the jspDestroy () method, and the service () method.
  • 23. Comm.: This collects the information of the input process, and sends these related Information’s to the Analyzer. Database: Store the white list, blacklist, and the user input URLs. Analyzer: It is the key component of Link Guard, which implements the Link Guard Algorithm; it uses data provided by Comm and Database, and sends the results to the Alert and Logger modules. Alerter: When receiving warning messages from Analyzer, it shows the related information to alert the users and send back the reactions of the user back to the Analyzer. Logger: Archive the history information, such as user events, alert information, for future use. Link guard algorithm
  • 24. TESTING Testing is the process of detecting errors. Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. TESTING METHODS System Testing Code Testing TYPES OF TESTING Unit Testing Link Testing
  • 25. TEST RESULTS The below shown are the project Inputs & Outputs which are shown in a diagrammatical representation Home page:
  • 27.
  • 28.
  • 29. CONCLUSION Phishing has becoming a serious network security problem, causing finical lose of billions of dollars to both consumers and e-commerce companies. In this project, we have studied the characteristics of the hyperlinks that were embedded in phishing e- mails. Since Phishing Guard is characteristic based, it can not only detect known attacks, but also is effective to the unknown ones. We have implemented Link Guard for Windows XP. Our experiment showed that Link Guard is light-weighted and can detect up to 96% unknown phishing attacks in real-time. We believe that Link Guard is not only useful for detecting phishing attacks, but also can shield users from malicious or unsolicited links in Web pages and Instant messages.