Skip to main content

Parsing Operations Based Approach towards Phishing Attacks

  • Conference paper
  • 1379 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6411))

Abstract

Currently, web attacks are so popular attacks under cyber crime category. Generally phishing attacks, SSL attacks and some other hacking attacks are kept into this category. Security against these attacks is the major issue of internet security.

This paper presents an new approach of parsing operation analysis of web URLs to provide the security against web attacks. This methodology is based on various parsing operations which use many techniques to detect the phishing attacks as well as other web attacks. This approach is completely based on the browser operation and also affects the speed of browsing. This approach also includes some DB-generated query operation, detection operation of the URL details and etc. Using proposed methodology, a new browser easily detects the phishing attacks, SSL attacks, and some other hacking attacks. With the use of this browser approach, we can easily achieve 98.14% security against phishing as well as web attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ollmann, G.: The Phishing Guide Understanding & Preventing Phishing Attacks, NGS Software Insight Security Research

    Google Scholar 

  2. Aburrous, M., Hossain, M.A., Dahal, K., Thabatah, F.: Modelling Intelligent Phishing Detection System for E-banking Using Fuzzy Data Mining. In: 2009 International Conference on CyberWorlds, CW, pp. 265–272 (2009)

    Google Scholar 

  3. Abu-Nimeh, S., Nair, S.: Bypassing Security Toolbars and Phishing Filters via DNS Poisoning. In: Global Telecommunications Conference, IEEE GLOBECOM 2008, November 30-December 4, pp. 1–6. IEEE (2008)

    Google Scholar 

  4. Yu, W.D., Nargundkar, S., Tiruthani, N.: A phishing vulnerability analysis of web based systems. In: IEEE Symposium on Computers and Communications, ISCC 2008, July 6-9, pp. 326–331 (2008)

    Google Scholar 

  5. Alnajim, A., Munro, M.: An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection. In: Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations (ITNG 2009), pp. 405–410. IEEE Computer Society, Washington, DC (2009), http://dx.doi.org/10.1109/ITNG.2009.109

    Chapter  Google Scholar 

  6. Chen, J., Guo, C.: Online Detection and Prevention of Phishing Attacks. In: Proc. Chinacom 2006 (2006)

    Google Scholar 

  7. Beginning PHP5, Apache, and MySQL Web Development by Elizabeth Naramore, Jason Gerner, Yann Le Scouarnec, Jeremy Stolz, Michael K. Glass ISBN: 9780764579660

    Google Scholar 

  8. Sophos White Paper, Phishing and the threat to corporate networks (2005)

    Google Scholar 

  9. PHP, AJAX, MySql and JavaScript Tutorials, http://www.w3schools.com/

  10. Prentice Hall - Deitel - Java How to Program, 4th edn., Java_2_Complete_Reference_5E, Java - How To Program, 6th edn.

    Google Scholar 

  11. von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Gedam, D.N.: RSA Based Confidentiality And Integrity Enhancements in SCOSTA-CL, A Thesis report, Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur, India (July 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tak, G.K., Tapaswi, S. (2012). Parsing Operations Based Approach towards Phishing Attacks. In: Kannan, R., Andres, F. (eds) Data Engineering and Management. ICDEM 2010. Lecture Notes in Computer Science, vol 6411. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27872-3_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27872-3_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27871-6

  • Online ISBN: 978-3-642-27872-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics