Please use this identifier to cite or link to this item:
http://localhost:8081/xmlui/handle/123456789/11956
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Singh, Ravindra Kumar | - |
dc.date.accessioned | 2014-11-28T10:47:15Z | - |
dc.date.available | 2014-11-28T10:47:15Z | - |
dc.date.issued | 2009 | - |
dc.identifier | M.Tech | en_US |
dc.identifier.uri | http://hdl.handle.net/123456789/11956 | - |
dc.guide | Singh, Kuldip | - |
dc.description.abstract | Phishing attacks are one of the emerging serious threats against personal data security. These attacks are often performed by sending out emails that seem to originate from a trusted party. The objective is to deceive the recipient to release sensitive information such as usernames, passwords, banking details, or credentials. The aim of phishing is to steal a user's identity in order to make fraudulent transactions as if the Phisher were the user. Though a large number of methods have been proposed and implemented for detecting Phishing attacks, a complete solution is missing. A great amount of research is being carried out to solve this problem using rule based method, browser based method and machine learning approaches but still there are insufficient methods that can be used against Phisher's novel attacks which they are able change time to time. In this Dissertation entitled "A RULE BASED APPROACH FOR DETECTING PHISHING ATTACKS", a solution is proposed for organization wide solution; rule set has been proposed for this system to filter out phishing mails at the perimeter of the organization. A balanced rule set has been used to keep false positive and false negative low. The proposed strategy has been simulated using C++. The accuracy of the rule set has been compared with existing approach and accuracy of the proposed rule set has been tested on publicly available phishing and non phishing mails. The relation between number of rules and false positive and false negative is also explored | en_US |
dc.language.iso | en | en_US |
dc.subject | ELECTRONICS AND COMPUTER ENGINEERING | en_US |
dc.subject | PHISHING ATTACKS | en_US |
dc.subject | DATA SECURITY | en_US |
dc.subject | TRANSACTIONS | en_US |
dc.title | A RULE BASED APPROACH FOR DETECTING PHISHING ATTACKS | en_US |
dc.type | M.Tech Dessertation | en_US |
dc.accession.number | G14445 | en_US |
Appears in Collections: | MASTERS' THESES (E & C) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ECDG14445.pdf | 5.36 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.