Desktop phishing attack detection and elimination using TSO program

In today's computer world security is the major issue. For every project most of the money spent on the security and testing than developing. Because security issue is one of the major issue for everyone to protect data. According to the security analysts more than seven billion hackers are existing over one hundred and five billion computers. Almost all of them trying to collapse the security system. There are so many security attacks are rotating throughout the network. Phishing is one of the popular security attack on the websites due to fall in this attack we lose our valuable information. Today most of us are using e-commerce websites for online shopping. Most of them are paying money through online. By taking this as an advantage so many hackers are host phishing website for stealing our bank and credit card detail. No only this so many social accounts are hacking daily. Other than this there is a new model of attack that is Desktop phishing. It is one of the advance attack which is applied on victim computer it can prevent the victim user actions in websites. By that we don't allow to the real page even to modify of change our password. By that the attacker success his goal. For phishing detection there are so many solutions are available. But Till now so many antiviruses can't find this attack. So we prose a TSO programmatically solution to Desktop phishing attack. It has a capability to detection and prevention of the attack.

[1]  Ronald L. Rivest,et al.  Lightweight Encryption for Email , 2005, SRUTI.

[2]  Jacinth Salome,et al.  Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection , 2007 .

[3]  Xiaotie Deng,et al.  Phishing Web page detection , 2005, Eighth International Conference on Document Analysis and Recognition (ICDAR'05).

[4]  Xiaotie Deng,et al.  An antiphishing strategy based on visual similarity assessment , 2006, IEEE Internet Computing.

[5]  Amir Herzberg,et al.  TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks , 2004 .

[6]  Lance James,et al.  Phishing exposed , 2005 .

[7]  Xiaotie Deng,et al.  Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD) , 2006, IEEE Transactions on Dependable and Secure Computing.

[8]  Joshua D. Reiss,et al.  Fuzzy Impulsive Control of High-Order Interpolative Low-Pass Sigma–Delta Modulators , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[9]  Cheng Wu,et al.  The continuity of Mamdani method , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[10]  Xuhua Ding,et al.  Anomaly Based Web Phishing Page Detection , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[11]  J. Doug Tygar,et al.  The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.