Design of Barcode Method for the Protection of Web Content

Authors:

G. Kanagavalli,Balaji. S,John Paul Praveen A,Mohanraj R,

DOI NO:

https://doi.org/10.26782/jmcms.spl.2019.08.00054

Keywords:

Phishing,Website page Protection,Triple DES,Barcode,

Abstract

Dynamic Phishing assaults, in which offenders bait Internet clients to sites that farce real sites, are happening with expanding recurrence and are making extensive mischief unfortunate casualties. Essentially, an aggressor (phisher) fools individuals into unveiling touchy data by sending phony messages to countless clients at irregular. Clueless clients who adhere to the guidance in the messages are coordinated to well-fabricated satirize website pages and requested to give delicate data, which the phisher then takes. This kind of extortion has developed into over 70% of phishing exercises are intended to take clients' record names and passwords. With such data, an assailant can recover progressively important data from the traded off records. Measurements distributed by the counter phishing working gathering (APWG) demonstrate that, toward the finish of Q2 in 2008, the quantity of vindictive site pages intended to take clients' passwords had expanded by 258% over a similar period in 2007. Accordingly, shielding clients from phishing assaults is critical. In a general sense, clients ought to be confirmed utilizing data that they can't promptly uncover to malevolent gatherings. Putting less dependence on the client during the verification procedure will upgrade security and dispose of numerous types of extortion. Numerous enemy of phishing arrangements have been grown, for example, content investigation and HTML, to distinguish phony website pages. Be that as it may, these procedures have flopped, as phishers are presently making phishing pages with non-analyzable components, for example, pictures, formats and glimmer questions and URL's.

Refference:

I. APWG 2004. Phishing Attack Trends Report.
http://www.antiphishing.org/APWG_P hishing_Attack_Repor Jun2004.pdf
II. APWG,2006.Origins of the Word
III. Haijun Zhang, Gang Liu, Tommy W. S. Chow and WenyinLiu,Textual and
Visual Content Based Anti-Phishing: A Bayesian Approach.IEEE
TRANSACTIONS ON NEURAL NETWORKS, pages 1532-1546,
IV. Visual Similarity Assessment Based on Earth Mover’s Distance(EMD). IEEE
TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,
pages 301-311 2006
V. Wenyin Liu, Xiao tie Deng, Guanglin Huang, and Anthony Y. Fu, An Anti
phishing Strategy Based on Visual Similarity Assessment. In IEEE Computer
Society, City University of Hong Kong.
VI. ‘Phishing’. http://www.anti*phishing.org/word_phish.htm

View | Download