Sie sind auf Seite 1von 3

Project Description

There are number of users who purchase products online and make payment through
various websites.There are multiple websites who ask user to provide sensitive data
such as username, password or credit card details etc. often for malicious reasons.
This type of websites is known as phishing website. In order to detect and predict
phishing website, we proposed an intelligent, flexible and effective system that is
based on using classification Data mining algorithm. We implemented classification
algorithm and techniques to extract the phishing data sets criteria to classify their
legitimacy. The phishing website can be detected based on some important
characteristics like URL and Domain Identity, and security and encryption criteria in
the final phishing detection rate. Once user makes transaction through online when
he makes payment through the website our system will use data mining algorithm to
detect whether the website is phishing website or not. This application can be used by
many E-commerce enterprises in order to make the whole transaction process secure.
Data mining algorithm used in this system provides better performance as compared
to other traditional classifications algorithms. With the help of this system user can
also purchase products online without any hesitation. Admin can add phishing
website url or fake website url into system where system could access and scan the
phishing website and by using algorithm, it will add new suspicious keywords to
database. System uses machine learning technique to add new keywords into
database.

Future work

The motive of this website made by us is to provide secure surfing on internet


so that in the upcoming future the users feel safe and secure to access the free
universe of internet. In the coming years, India is looking forward to become a
''Digital India'' and our project could play an important role in building a ''Secure
Digital India''.
References

CALMAN, C. Bigger phish to fry: California’s antiphishing statute and its potential imposition
of secondary liability on internet service providers. Richmond Journal of Law and
Technology XIII, 1 (2006).

2. CAVUSOGLU, H., AND RAGHUNATHAN, S. Configuration of Detection Software: A


Comparison of Decision and Game Theory Approaches. Decision Analysis 1, 3 (2004), 131–
148.

3. CRANOR, L. F. A framework for reasoning about the human in the loop. In UPSEC’08:
Proceedings of the 1st Conference on Usability, Psychology, and Security (Berkeley, CA,
USA, 2008), USENIX Association, pp. 1–15.

4. DHAMIJA, R., AND TYGAR, J. D. The battle against phishing: Dynamic Security Skins. In
SOUPS ’05: Proceedings of the 2005 symposium on Usable privacy and security (New York,
NY, USA, 2005), ACM Press, pp. 77–88.

5. DOWNS, J., AND FISCHHOFF, B. Adolescent Health: Understanding and Preventing Risk
Behaviors. John Wiley and Sons, 2009, ch. 5.

6. DOWNS, J. S., HOLBROOK, M. B., AND CRANOR, L. F. Decision strategies and susceptibility
to phishing. In SOUPS ’06: Proceedings of the second symposium on Usable privacy and
security (New York, NY, USA, 2006), ACM Press, pp. 79–90.

7. EGELMAN, S., CRANOR, L. F., AND HONG, J. You’ve been warned: an empirical study of
the effectiveness of web browser phishing warnings. In CHI ’08: Proceeding of the
twentysixth annual SIGCHI conference on Human factors in computing systems (New York,
NY, USA, 2008), ACM, pp. 1065–1074.

8. FLYNN, J., SLOVIC, P., AND MERTZ, C. K. Gender, race, and perception of environmental
health risks. Risk Analysis 14, 6 (1994), 1101– 1108.

9. GARERA, S., PROVOS, N., CHEW, M., AND RUBIN, A. D. A framework for detection and
measurement of phishing attacks. In WORM ’07: Proceedings of the 2007 ACM workshop
on Recurring malcode (New York, NY, USA, 2007), ACM, pp. 1–8.
10. ANDERSON, R., AND MOORE, T. The economics of information security. Science 314,
5799 (2006), 610–613.

11. GORDON, L. A., AND LOEB, M. P. The economics of information security investment.
ACM Trans. Inf. Syst. Secur. 5, 4 (2002), 438–457

12. HERLEY, C., AND FLORˆENCIO, D. A profitless endeavor: phishing as tragedy of the
commons. In NSPW ’08: Proceedings of the 2008 workshop on New security paradigms
(New York, NY, USA, 2008), ACM, pp. 59–70

Das könnte Ihnen auch gefallen