Project Topics

www.seminarsonly.com

Engineering Projects

Published on Nov 30, 2023

Abstract

An approach to detection of phishing WebPages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate webpage owner can use this approach to search the Web for suspicious WebPages which are visually similar to the true webpage. A webpage is reported as a phishing suspect if the visual similarity is higher than its corresponding preset threshold.

Preliminary experiments show that the approach can successfully detect those phishing WebPages for online use.

Introduction

Online services have become important part of our lives as they allow anytime, anywhere access to information. Clearly, such services are not only useful for Internet users, but they have also become indispensable for financial organizations because they help reduce operational costs. For example, there are millions of users who use the Internet for performing online banking transactions.

The web is convenient for users as they are not bound to the opening hours of banks and do not have to be physically present. Unfortunately, the usefulness of online services has been overshadowed by large-scale phishing attacks launched against Internet users.

Phishing is a form of identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value. In a typical phishing attack, a large number of spoofed e-mails are sent to random users (i.e., analogous to spam e-mail).

These e-mails are disguised such that an unsuspecting victim is easily convinced that the e-mail is coming from a legitimate organization such as a bank. Typically, these e-mails requests the victims to "update" their online banking information.

In order not to raise suspicion, the attackers have to provide a plausible explanation for the sudden need to update this confidential information. For example, early phishing e-mails often contained the explanation that the computer systems of the organization were being restructured. Hence, customers were supposedly being asked to "verify" that their information was correct.

However, because phishing has received significant press coverage and attention in the last couple of years, ironically, phishers are now often persuading victims to enter their online banking credentials as a precaution for the imminent phishing threat.

In phishing e-mails, the request to update confidential information is often accompanied by a subtle threat in order to make the persuasion of the victim easier. For example, the phishers may convince victims that the failure to update their information will result in their banking account being suspended

Software Requirements:

PHP

Apache HTTP server 2.2

Hardware Requirements:

1 GB RAM

60 GB Hard Disk