Enviar pesquisa
Carregar
50120130405019
•
0 gostou
•
211 visualizações
IAEME Publication
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 7
Baixar agora
Baixar para ler offline
Recomendados
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
IJERA Editor
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
IRJET Journal
Intelligent Phishing Website Detection and Prevention System by Using Link Gu...
Intelligent Phishing Website Detection and Prevention System by Using Link Gu...
IOSR Journals
An overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Alexander Decker
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
eSAT Publishing House
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
eSAT Journals
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS Location
IRJET Journal
Online Secure payment System using shared Images
Online Secure payment System using shared Images
IRJET Journal
Recomendados
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
IJERA Editor
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
IRJET Journal
Intelligent Phishing Website Detection and Prevention System by Using Link Gu...
Intelligent Phishing Website Detection and Prevention System by Using Link Gu...
IOSR Journals
An overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Alexander Decker
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
eSAT Publishing House
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
eSAT Journals
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS Location
IRJET Journal
Online Secure payment System using shared Images
Online Secure payment System using shared Images
IRJET Journal
Bh4101338342
Bh4101338342
IJERA Editor
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET Journal
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
Aa4502172179
Aa4502172179
IJERA Editor
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
IRJET Journal
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA Cryptosystem
AM Publications,India
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
Dr. Amarjeet Singh
Dynamic watermarking
Dynamic watermarking
Editor Jacotech
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
IJCERT
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
ijiert bestjournal
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
International Journal of Technical Research & Application
Amazon & E Bay
Amazon & E Bay
Sabyasachi Dasgupta
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...
IJERA Editor
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
IJASRD Journal
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
cscpconf
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
IJMER
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Techsylvania
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
RAHUL KUMAR
Cyber law case Assignment
Cyber law case Assignment
9945446746
Cyber law assignment
Cyber law assignment
Rini Mahade
40120130406008
40120130406008
IAEME Publication
50120130406026
50120130406026
IAEME Publication
Mais conteúdo relacionado
Mais procurados
Bh4101338342
Bh4101338342
IJERA Editor
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET Journal
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
Aa4502172179
Aa4502172179
IJERA Editor
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
IRJET Journal
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA Cryptosystem
AM Publications,India
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
Dr. Amarjeet Singh
Dynamic watermarking
Dynamic watermarking
Editor Jacotech
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
IJCERT
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
ijiert bestjournal
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
International Journal of Technical Research & Application
Amazon & E Bay
Amazon & E Bay
Sabyasachi Dasgupta
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...
IJERA Editor
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
IJASRD Journal
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
cscpconf
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
IJMER
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Techsylvania
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
RAHUL KUMAR
Cyber law case Assignment
Cyber law case Assignment
9945446746
Cyber law assignment
Cyber law assignment
Rini Mahade
Mais procurados
(20)
Bh4101338342
Bh4101338342
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
Aa4502172179
Aa4502172179
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA Cryptosystem
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
Dynamic watermarking
Dynamic watermarking
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
Amazon & E Bay
Amazon & E Bay
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
Cyber law case Assignment
Cyber law case Assignment
Cyber law assignment
Cyber law assignment
Destaque
40120130406008
40120130406008
IAEME Publication
50120130406026
50120130406026
IAEME Publication
50320130403008
50320130403008
IAEME Publication
40220130405013
40220130405013
IAEME Publication
20320130406021 2
20320130406021 2
IAEME Publication
40220130406005
40220130406005
IAEME Publication
50120130406003
50120130406003
IAEME Publication
40120130405012
40120130405012
IAEME Publication
Destaque
(8)
40120130406008
40120130406008
50120130406026
50120130406026
50320130403008
50320130403008
40220130405013
40220130405013
20320130406021 2
20320130406021 2
40220130406005
40220130406005
50120130406003
50120130406003
40120130405012
40120130405012
Semelhante a 50120130405019
A literature survey on anti phishing
A literature survey on anti phishing
IJCSES Journal
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
IRJET Journal
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of Stealing
Avinash Sinha
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
AM Publications,India
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
CSCJournals
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
IJTET Journal
Advanced phishing the art of stealing
Advanced phishing the art of stealing
prj_publication
Advanced phishing the art of stealing
Advanced phishing the art of stealing
prj_publication
IRJET- Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
IRJET Journal
Image authentication for secure login
Image authentication for secure login
IRJET Journal
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
cscpconf
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
IRJET Journal
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
IJNSA Journal
Paper id 35201568
Paper id 35201568
IJRAT
Cyber Threat Prediction using ML
Cyber Threat Prediction using ML
IRJET Journal
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET Journal
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine Learning
IRJET Journal
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
IJNSA Journal
Semelhante a 50120130405019
(20)
A literature survey on anti phishing
A literature survey on anti phishing
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of Stealing
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Advanced phishing the art of stealing
Advanced phishing the art of stealing
Advanced phishing the art of stealing
Advanced phishing the art of stealing
IRJET- Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
Image authentication for secure login
Image authentication for secure login
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
Paper id 35201568
Paper id 35201568
Cyber Threat Prediction using ML
Cyber Threat Prediction using ML
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine Learning
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
Mais de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Mais de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Nikki Chapple
A Framework for Development in the AI Age
A Framework for Development in the AI Age
Cprime
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
panagenda
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Alkin Tezuysal
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Nicole Novielli
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Ingrid Airi González
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Knoldus Inc.
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
ThousandEyes
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
Neo4j
2024 April Patch Tuesday
2024 April Patch Tuesday
Ivanti
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
TopCSSGallery
Último
(20)
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
A Framework for Development in the AI Age
A Framework for Development in the AI Age
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
2024 April Patch Tuesday
2024 April Patch Tuesday
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
50120130405019
1.
International Journal of
Computer EngineeringOF COMPUTER ENGINEERING & INTERNATIONAL JOURNAL and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 5, September - October (2013), © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 5, September – October (2013), pp. 165-171 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET ©IAEME DETECTION OF PHISHING E-COMMERCE WEBSITES USING VISUAL CRYPTOGRAPHY ULKA M. BANSODE1, Prof. GAURI R. RAO2, Dr. S. H. PATIL3 1 Department of Computer Engineering, Bharati Vidyapeeth Deemed University, College of Engineering, Pune, Maharashtra, India. 2 Associate Professor, Department of Computer Engineering, Bharati Vidyapeeth Deemed University, College of Engineering, Pune, Maharashtra, India. 3 Head of Department, Department of Computer Engineering, Bharati Vidyapeeth Deemed University, College of Engineering, Pune, Maharashtra, India ABSTRACT The growth of the Internet has allowed users to manage their personal finances and expenditure online. E-commerce and online banking has made life easier. The increase in an online service offered to consumers has naturally led to an increase in the exchange of personal information to access such services. With the popularity of E-commerce websites various online attacks has been increased one of them is phishing attack. Phishing is a fraudulent activity designed to steal your valuable personal data such as passwords, username, credit card numbers, account number etc. by behaving as a trustworthy entity in an electronic communication. Popular social web sites, bank, online commerce site or auction sites are commonly used to lure the unsuspecting public. Phishing emails may contain links that redirects the user to a fake website whose look and feel are almost identical to the legitimate one. In this paper we have presented a new approach for detection of phishing E-commerce websites. Phishing websites are crafted to closely mimic look and feel of legitimate sites. Keywords: Image shares, Phishing, Visual Cryptography. 1. INTRODUCTION Now a day’s Online Transactions are very common and there are various attacks present behind this. One among them is the phishing attack. Phishing has become one of the major issue in recent times. This attack will not hack any server or the website; it just creates duplicate copy of the website and tries to communicate to the user. The major reason for concern in the fact that phishing activity directly hit at us as it aims at securing our personal and sensitive information. This personal 165
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 5, September - October (2013), © IAEME information can be used for the purpose of committing financial fraud, has become a criminal activity on the Internet. Criminals targeting user information are able to profit from the increased adoption of online services for many day to day activities including banking, shopping and leisure activities. Many times the sites that closely mimic look and feel of legitimate sites are crafted and promoted on the Internet. As these sites looks like legitimate site, user can login into that site through which intruder/attacker can get the sensitive information likeUsername, Bank account numbers, Password etc. Some of the Examples of Phishing Scams are • Many times the sites that closely mimic look and feel of legitimate sites are crafted and promoted on the Internet. As these sites looks like legitimate sites, user logs in into those sites through which his/her sensitive information like bank details, name or other personal information can be stealed. • Sending the fake e-mail message to the bank user’s, as if the database of the bank has been crashed due to some technical reasons, so they request you for updation of the personal information. • Sending e-mail message to the user’s as if they won the prize and to deposit the amount they are requested to send the personal information and bank account numbers. So to prevent against phishing attack it is very important to make sure that whether the site you are visiting, gets open from right or truthful source or not? Whether it is asking you to send personal information and bank details again and again? Thus making it easier to detect phishing websites and protect against phishing attack we are introducing a new method which can be used as a safe way against phishing which is named as “Detection of Phishing E-commerce websites using Visual Cryptography”. In this approach the identity of the website is verified which proves that whether it is a genuine website or not to use E-commerce, online booking system and bank transactions etc. The concept of Visual Cryptography is used. Visual Cryptography is a secure method that encrypts an image by breaking it into shares. 2. BACKGROUND Various types of attacks present on the Internet. One of the major attack is phishing attack which consists of sending electronic mail or other form of communications to group of people asking for their personal information like usernames and passwords. Attackers create the websites that closely look like authorized websites and promotes those websites on Internet. When user login through those websites they are actually redirected to phisher’s database where attacker can get personal information of user like password, account details, username etc. User Original communication Phishing Attack Actual Website Phishing Website Fig. 1: Phishing Attack 166
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 5, September - October (2013), © IAEME 3. RELATED WORK The DNS Based Anti-phishing approach [2] includes blacklist, heuristic detection and page similarity assessment. The commonly used anti-phishing approach by browser is blacklist which is DNS based anti-phishing approach technique. Netscape browser 8.1 and Internet Explorer7 and Google Safe browsing are important browsers which use blacklist to protect users when they are navigating through phishing sites. The estimation of whether the page has some phishing heuristic characteristics is done in the Heuristic based anti-phishing technique. [3] For example spoof guard toolbar include heuristic characteristics like checking against previously seen images, host name and checking URL for common spoofing techniques. Automated Challenge Response Method [4] is an authentication mechanism, which includes generation module from server. This module then interacts with Challenge-Response interface in client and request for response from user which in turn calls the get response application installed in the client machine. Once the challenge response is validated, user credentials are demanded from client and are validated by server to proceed the transaction. Cryptography is the best known technique to protect data. It is an art of protecting information by sending and receiving encrypted messages that can be decrypted by sender or receiver. Naor and Shamir were introduced Visual Cryptography schemes [5] is a secure way to allow the secret sharing of images without any cryptographic computation. A Segment Based Visual Cryptography suggested by Borchert [6] can encrypt only the amount, numbers like bank account number and messages containing symbols. Visual Cryptography for Print and Scan Application [7] suggested by W-Q Yan, D. Jin can be applied for printed text and images only. 4. VISUAL CRYPTOGRAPHY Visual cryptography is a popular solution for image encryption. Visual cryptography is a cryptographic technique which allows visual information (e.g. printed text, pictures) to be encrypted in such a way that the decryption can be performed without complex algorithm and without the aid of computers. It uses the human visual system to identify secrete image generated by stacking the shares together. Following are the Visual Cryptography Schemes: 1. (n, n) visual cryptography: The (n, n) visual cryptography generates n (n ≥2) number of shares and for getting back the secrete information all shares are needed to be stacked together. 2. (2, 2) visual cryptography: The (2, 2) visual cryptographic scheme generates 2 shares and the secret information will be regenerated after stacking these two shares. 3. (k, n) visual cryptography: The (k, n) visual cryptographic scheme generates n (n ≥2) number of shares and for regeneration of secrete information at least any k (2≤ k ≤ n) shares are needed. In this approach we have used (2, 2) VCS, each pixel P in the image is encrypted into two sub pixels called shares. The following figure denotes the shares for a white and black pixel. Here choice of shares for black and white pixel is randomly determined. When these two shares are stacked, the value of the original pixel P can be determined. 167
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 5, September - October (2013), © IAEME Fig 2: 2-out-2 Visual Cryptography Scheme 2 5. SYSTEM ARCHITECTURE Fig. 3: System Architecture 6. ALGORITHM Step 1. User will login and select a random image. Step 2. Perform cryptography and convert the image into shares. . Step 3. Encrypt one of the shares and send to trusted server through server under test. Step 4. Compare server under test with list of registered servers. Step 5. If server under test is registered server, then perform decryptography and send decrypted ptography share to client and go to step 7, else go to Step 6. lse Step 6. If server under test is not a registered server, then trusted server will send any garbage share to client. 168
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 5, September - October (2013), © IAEME Step 7: At client side, both these shares are stacked together. If stacking of these shares results in an original image as was selected at the time of login then go to Step 8 else go to Step 9. Step 8. Display message ‘Not a phishing website’, go to Step 10 Step 9. Display message ‘Phishing Website’, go to Step 10 Step 10. End. 7. RESULTS This system is tested using 2 registered servers and 1 unregistered server, these servers can be considered as server under test. Step1: While login user will select an image by clicking ‘Load’ button as shown in Fig. 4. Fig. 4 Step2: Click ‘Create Shares’ and shares will be generated as shown in the Fig. 5 Fig. 5 169
6.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 5, September - October (2013), © IAEME Step3: Click ‘Verify Server’ button. If server under test is genuine/true server then stacking of these shares will result in an original image as shown in Fig. 6. Fig. 6 If Server under test is not a genuine/true server then stacking of these shares will result in any unrecognizable image share as shown in Fig. 7. Fig. 7 8. CONCLUSION In this paper we have presented an approach for detecting phishing E-commerce websites. We have used Visual Cryptography as a solution for anti-phishing. With the help of VC, the security of E-commerce website has been increased. The users are more secure, as users are able to update keys at every login. The proposed methodology preserves confidential information of the users and it verifies whether the website is genuine/true or phishing website. If the website is phishing website, then in that situation phishing website can’t display original image selected by user. 170
7.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 5, September - October (2013), © IAEME REFERENCES [1] Mintu Philip; Divya James; ”A Novel Anti phishing Framework based on Visual Cryptography” in Proceedings of IEEE International Conference on Power, Signals, Controls and Computation, 2012. [2] Liang Xiaoying.; Sun Bin.; Wen Qiaoyan.; "A DNS based Anti-Phishing Approach," in Proceedings of IEEE Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010. [3] Ishtiaq, S.; Nourian, A.; Maheswaran, M.;" CASTLE: A social framework for collaborative antiphishing databases", in Proceedings of IEEE- 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2009. [4] Thiyagarajan, P.; Aghila, G.; Venkatesan, V.P.; "Anti-Phishing Technique using Automated Challenge Response Method", in Proceedings of IEEE- International Conference on Communications and Computational Intelligence, 2010. [5] M. Naor and A. Shamir; “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12. [6] B. Borchert, .Segment Based Visual Cryptography. WSI Press, Germany, 2007. [7] D. Jin, M. S. Kanakanahalli and W-Q Yan; .Visual Cryptography for Print and Scan Applications, IEEE Transactions, ISCAS-2004, pp. 572-575. [8] Shiny Malar F.R, Jeya Kumar M.K, “A Novel Algorithm for Color Visual Cryptographic Images using Error Filtering Schemes”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 323 - 336, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [9] V.Srikanth and Dr.R.Dhanapal, “Ecommerce Online Security and Trust Marks”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 238 - 255, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [10] B.Saichandana, Dr.K.srinivas and Dr. Reddi Kiran Kumar, “Visual Cryptography Scheme for Color Images”, International Journal of Computer Engineering & Technology (IJCET), Volume 1, Issue 1, 2010, pp. 207 - 212, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 171
Baixar agora