Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/11956
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSingh, Ravindra Kumar-
dc.date.accessioned2014-11-28T10:47:15Z-
dc.date.available2014-11-28T10:47:15Z-
dc.date.issued2009-
dc.identifierM.Techen_US
dc.identifier.urihttp://hdl.handle.net/123456789/11956-
dc.guideSingh, Kuldip-
dc.description.abstractPhishing attacks are one of the emerging serious threats against personal data security. These attacks are often performed by sending out emails that seem to originate from a trusted party. The objective is to deceive the recipient to release sensitive information such as usernames, passwords, banking details, or credentials. The aim of phishing is to steal a user's identity in order to make fraudulent transactions as if the Phisher were the user. Though a large number of methods have been proposed and implemented for detecting Phishing attacks, a complete solution is missing. A great amount of research is being carried out to solve this problem using rule based method, browser based method and machine learning approaches but still there are insufficient methods that can be used against Phisher's novel attacks which they are able change time to time. In this Dissertation entitled "A RULE BASED APPROACH FOR DETECTING PHISHING ATTACKS", a solution is proposed for organization wide solution; rule set has been proposed for this system to filter out phishing mails at the perimeter of the organization. A balanced rule set has been used to keep false positive and false negative low. The proposed strategy has been simulated using C++. The accuracy of the rule set has been compared with existing approach and accuracy of the proposed rule set has been tested on publicly available phishing and non phishing mails. The relation between number of rules and false positive and false negative is also exploreden_US
dc.language.isoenen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectPHISHING ATTACKSen_US
dc.subjectDATA SECURITYen_US
dc.subjectTRANSACTIONSen_US
dc.titleA RULE BASED APPROACH FOR DETECTING PHISHING ATTACKSen_US
dc.typeM.Tech Dessertationen_US
dc.accession.numberG14445en_US
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECDG14445.pdf5.36 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.