Towards detecting phishing web pages
 Cyber Crime- the major concern.
 Internet frauds affect the rapidly growing online
services.
 E-commerce is the main target.
 Social communication sites and mail service are
also victim of them.
 Phishing is an alarming threat.
 Technical steps needed to defend them.
2
PROBLEM STATEMENT
 Phishing attacks succeed if users fail to detect
phishing sites.
 Previous anti-phishing falls into four categories:
 Study on phishing
 Training people
 User interface
 Detection tools
 Previous works deals with limited service.
 Our approach- Development of an automated
phishing detection method.
3
PHISHING?
 A criminal trick of stealing sensitive personal
information.
 Fooled user and push them to fall in the trick.
 Use social engineering and technical strategy.
 Mainly, duplicate original web-pages.
 First describe in 1987.
4
ATTRIBUTES OF PHISHING
 Similar appearance of web-page.
 IP based URL & Non Matching URL.
 URL contain abnormal characters.
 Misspelled URL.
 Using script or add-in to web browser to cover the
address bar.
5
PHISHING STATS
 According to APWG
 According to PhishTank
Phishes Verified as Valid Suspected Phishes
Submitted
Total 531086 Total 928206
Online 2770 Online 3021
Offline 528316 Offline 925174
Total phishing attack. (Up to 6th April 2010)
6
ANTI-PHISHING
 Social response
 Educating people.
 Changing habit.
 Technical support
 Identify phishing site.
 Implementation of secure model.
 Browser alert.
 Eliminating phishing mails.
 Monitoring and Takedown.
7
METHODOLOGY
Step 1: Checking with database
8
?
?
METHODOLOGY
Step 2: Checking abnormal conditions
9
?
?
?
METHODOLOGY
Step 2: Search for new Phishing
10
?
?
??
?
RESULTS
11
EXPERIMENTAL ANALYSIS
Approach Accuracy Time (second)
IP based URL 100% 17
Exists in phishing database 97% 59
Matching source content 81% 134
Abnormal condition 79% 51
12
DISCUSSION
 Our approach reduces the ability of attackers to
automate their attacks, cutting into their profitability.
 By using the minimal knowledge base provided by
the user-selected web-page, our system is able to
compare potential phishing sites with real sites.
 Performance and accuracy can be improved by
using an image segmentation algorithm.
 Flash contents can’t be validated whether phishing
threat or not in our system.
13
REFERENCES
 Anti-Phishing Working Group (APWG).
http://www.antiphishing.org/ . April 7 2010.
 PhishTank. http://www.phishtank.com/. April 6 2010.
 Y. Zhang, J. Hong, and L. Cranor. Cantina: A
content-based approach to detecting phishing web
sites. 16th international conference on World Wide
Web in 2007.
 Felix, Jerry and Hauck, Chris (September 1987).
"System Security: A Hacker's Perspective". 1987
Interex Proceedings 1: 6.
14
THANK YOU
15

More Related Content

PPT
Phishing detection & protection scheme
PPTX
PHISHING DETECTION
PPTX
36.44.final
PPT
thesis 36 44 Final
PDF
10 Steps to Creating a Corporate Phishing Awareness Program
PPTX
36 44 Final
PPTX
NASA Cyber Security Webinar: Phishing Detection Strategies
Phishing detection & protection scheme
PHISHING DETECTION
36.44.final
thesis 36 44 Final
10 Steps to Creating a Corporate Phishing Awareness Program
36 44 Final
NASA Cyber Security Webinar: Phishing Detection Strategies

What's hot (20)

PPTX
Phishing ppt
PPTX
Phishing ppt
PPTX
Phishing awareness
PPTX
Email phishing and countermeasures
PPTX
Phishing Attacks
PPTX
PPTX
Different Types of Phishing Attacks
PDF
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
PPTX
Ransomware
PPTX
Phishing ppt
PDF
PHISHING PROTECTION
PPTX
Phishing Technology
PPTX
Phishing Presentation
PPTX
PPT on Phishing
PPTX
Phishing and hacking
PPTX
Phishing - A modern web attack
PPT
Phishing
PDF
PhishingBox Presents 'What is Phishing' 2017
PPT
Phishing & Pharming
Phishing ppt
Phishing ppt
Phishing awareness
Email phishing and countermeasures
Phishing Attacks
Different Types of Phishing Attacks
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
Ransomware
Phishing ppt
PHISHING PROTECTION
Phishing Technology
Phishing Presentation
PPT on Phishing
Phishing and hacking
Phishing - A modern web attack
Phishing
PhishingBox Presents 'What is Phishing' 2017
Phishing & Pharming
Ad

Viewers also liked (6)

PPSX
IEEE 1599 Music Encoding and Interaction
PPSX
Introduction to Hybrid SLI Technology
PDF
Cheatsheet of msdos
PPTX
Italian vowel triangle with IPA
PDF
Hype vs. Reality: The AI Explainer
PDF
Study: The Future of VR, AR and Self-Driving Cars
IEEE 1599 Music Encoding and Interaction
Introduction to Hybrid SLI Technology
Cheatsheet of msdos
Italian vowel triangle with IPA
Hype vs. Reality: The AI Explainer
Study: The Future of VR, AR and Self-Driving Cars
Ad

Similar to Towards detecting phishing web pages (20)

PDF
IJSRED-V2I4P0
PDF
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
PPTX
Major Prc.pptx
PPTX
Anti phishing
PDF
HIGH ACCURACY PHISHING DETECTION
PDF
IRJET- Phishing Website Detection System
PDF
Phishing Website Detection using Classification Algorithms
PDF
IRJET- Phishing and Anti-Phishing Techniques
PPT
Lifeng hu anti_phishing
PPTX
FINAL PROPOSAL PRESENTATION SLIDE.pptx
PDF
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
PPSX
Shiv seminar final
PPTX
Phishing Attack : A big Threat
PDF
PHISHING URL DETECTION USING MACHINE LEARNING
PDF
IRJET-Content based approach for Detection of Phishing Sites
PDF
IRJET- Phishing Website Detection based on Machine Learning
PDF
Phishing: Analysis and Countermeasures
PDF
Web phish detection (an evolutionary approach)
PDF
Web phish detection (an evolutionary approach)
PDF
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IJSRED-V2I4P0
IRJET - Detection and Prevention of Phishing Websites using Machine Learning ...
Major Prc.pptx
Anti phishing
HIGH ACCURACY PHISHING DETECTION
IRJET- Phishing Website Detection System
Phishing Website Detection using Classification Algorithms
IRJET- Phishing and Anti-Phishing Techniques
Lifeng hu anti_phishing
FINAL PROPOSAL PRESENTATION SLIDE.pptx
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
Shiv seminar final
Phishing Attack : A big Threat
PHISHING URL DETECTION USING MACHINE LEARNING
IRJET-Content based approach for Detection of Phishing Sites
IRJET- Phishing Website Detection based on Machine Learning
Phishing: Analysis and Countermeasures
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm

Recently uploaded (20)

PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Five Habits of High-Impact Board Members
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PPT
What is a Computer? Input Devices /output devices
PPTX
2018-HIPAA-Renewal-Training for executives
DOCX
search engine optimization ppt fir known well about this
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Microsoft Excel 365/2024 Beginner's training
NewMind AI Weekly Chronicles – August ’25 Week III
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
OpenACC and Open Hackathons Monthly Highlights July 2025
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Five Habits of High-Impact Board Members
sbt 2.0: go big (Scala Days 2025 edition)
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Module 1.ppt Iot fundamentals and Architecture
What is a Computer? Input Devices /output devices
2018-HIPAA-Renewal-Training for executives
search engine optimization ppt fir known well about this
Flame analysis and combustion estimation using large language and vision assi...
Zenith AI: Advanced Artificial Intelligence
Getting started with AI Agents and Multi-Agent Systems
A proposed approach for plagiarism detection in Myanmar Unicode text
A review of recent deep learning applications in wood surface defect identifi...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx

Towards detecting phishing web pages

  • 2.  Cyber Crime- the major concern.  Internet frauds affect the rapidly growing online services.  E-commerce is the main target.  Social communication sites and mail service are also victim of them.  Phishing is an alarming threat.  Technical steps needed to defend them. 2
  • 3. PROBLEM STATEMENT  Phishing attacks succeed if users fail to detect phishing sites.  Previous anti-phishing falls into four categories:  Study on phishing  Training people  User interface  Detection tools  Previous works deals with limited service.  Our approach- Development of an automated phishing detection method. 3
  • 4. PHISHING?  A criminal trick of stealing sensitive personal information.  Fooled user and push them to fall in the trick.  Use social engineering and technical strategy.  Mainly, duplicate original web-pages.  First describe in 1987. 4
  • 5. ATTRIBUTES OF PHISHING  Similar appearance of web-page.  IP based URL & Non Matching URL.  URL contain abnormal characters.  Misspelled URL.  Using script or add-in to web browser to cover the address bar. 5
  • 6. PHISHING STATS  According to APWG  According to PhishTank Phishes Verified as Valid Suspected Phishes Submitted Total 531086 Total 928206 Online 2770 Online 3021 Offline 528316 Offline 925174 Total phishing attack. (Up to 6th April 2010) 6
  • 7. ANTI-PHISHING  Social response  Educating people.  Changing habit.  Technical support  Identify phishing site.  Implementation of secure model.  Browser alert.  Eliminating phishing mails.  Monitoring and Takedown. 7
  • 8. METHODOLOGY Step 1: Checking with database 8 ? ?
  • 9. METHODOLOGY Step 2: Checking abnormal conditions 9 ? ? ?
  • 10. METHODOLOGY Step 2: Search for new Phishing 10 ? ? ?? ?
  • 12. EXPERIMENTAL ANALYSIS Approach Accuracy Time (second) IP based URL 100% 17 Exists in phishing database 97% 59 Matching source content 81% 134 Abnormal condition 79% 51 12
  • 13. DISCUSSION  Our approach reduces the ability of attackers to automate their attacks, cutting into their profitability.  By using the minimal knowledge base provided by the user-selected web-page, our system is able to compare potential phishing sites with real sites.  Performance and accuracy can be improved by using an image segmentation algorithm.  Flash contents can’t be validated whether phishing threat or not in our system. 13
  • 14. REFERENCES  Anti-Phishing Working Group (APWG). http://www.antiphishing.org/ . April 7 2010.  PhishTank. http://www.phishtank.com/. April 6 2010.  Y. Zhang, J. Hong, and L. Cranor. Cantina: A content-based approach to detecting phishing web sites. 16th international conference on World Wide Web in 2007.  Felix, Jerry and Hauck, Chris (September 1987). "System Security: A Hacker's Perspective". 1987 Interex Proceedings 1: 6. 14