phishing mail by saikiran panjala
TRANSCRIPT
PHISHING MAIL
Presenting By
xxxxx12xxxxxxxx
Under the guidance of
xxxx, xxx
CELL PHONE VIRUS & SECURITY 2
ABSTRACT• Phishing is the combination of social engineering and technical
exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker
• Phishing has become the most popular practice among the criminals of the Web.
• Phishing attacks are becoming more frequent and sophisticated.• We propose a technique where we consider the advantages of
blacklist, white list and heuristic technique for increasing accuracy and reducing false positive rate.
• It will detect phishing mail if DNS in actual link is present in blacklist.
• DNS is present in white list then it is considered as legitimate DNS.• At the same time we are decreasing false positive rate by combining
features of DNS, textual content analysis of email and URL analysis.
CELL PHONE VIRUS & SECURITY 3
INTRODUCTION
CELL PHONE VIRUS & SECURITY 4
CELL PHONE VIRUS & SECURITY 5
CELL PHONE VIRUS & SECURITY 6
CELL PHONE VIRUS & SECURITY 7
CELL PHONE VIRUS & SECURITY 8
CELL PHONE VIRUS & SECURITY 9
CELL PHONE VIRUS & SECURITY 10
CELL PHONE VIRUS & SECURITY 11
CELL PHONE VIRUS & SECURITY 12
CELL PHONE VIRUS & SECURITY 13
CELL PHONE VIRUS & SECURITY 14
Conclusion
• Phishing is a growing crime and one that we must be aware of. Although laws have been enacted, education is the best defence against phishing. Being a bit suspicious of all electronic communications and websites is recommmended. Look out for the common characteristics - sense of urgency, request for verification, and grammer and spelling errors. Also, get in the habit of comparing the provided URL with the an independent search for the company's website.
CELL PHONE VIRUS & SECURITY 15
Reference
• http://www.bigoo.ws/Images/animation-miscellaneous/Fishing-2-285829.htm
• http://antiphishing.org/APWG_Phishing_Activity_Report_Feb05.pdf
• https://www.paypal.com/us/cgi-bin/webscr?
THANK YOU