PAPG - Personalized Anti-Phishing Guard

Security and privacy have been considered a corner stone in all electronic transactions nowadays. People are becoming very cautious when conducting electronic transactions over internet. One of the major issues that frightens them is identity theft. Identity theft might be conducted using phishing techniques that aims to trick the user to provide his credentials in a well-organized tactic. Efforts have been done towards fighting against phishing attacks and hence identify theft. However, most of these efforts are either computationally exhaustive to the electronic device or depend on a third party to perform the task. In this paper, we propose a plugin called Personalized Anti-Phishing Guard - PAPG that is managed personally on the device and is used to guard the user against phishing attacks. The plugin maintains data locally and may not need to synchronize with a third party. Besides, PAPG depends on the user's feedback to build the local knowledge base that is used to support the decision. The user might also store his profile and reuse it with other devices and from different locations without having to configure it again

[1]  Chun-Ying Huang,et al.  Mitigate web phishing using site signatures , 2010, TENCON 2010 - 2010 IEEE Region 10 Conference.

[2]  Kun Li,et al.  BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[3]  Ankit Kumar Jain,et al.  Phishing Detection: Analysis of Visual Similarity Based Approaches , 2017, Secur. Commun. Networks.

[4]  Abdulghani Ali Ahmed,et al.  Real time detection of phishing websites , 2016, 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).

[5]  Ramana Rao Kompella,et al.  PhishNet: Predictive Blacklisting to Detect Phishing Attacks , 2010, 2010 Proceedings IEEE INFOCOM.

[6]  Lorrie Faith Cranor,et al.  Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.

[7]  Akira Yamada,et al.  Visual similarity-based phishing detection without victim site information , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.

[8]  Ankit Kumar Jain,et al.  A novel approach to protect against phishing attacks at client side using auto-updated white-list , 2016, EURASIP Journal on Information Security.

[9]  Belal Amro,et al.  Phishing Techniques in Mobile Devices , 2018, ArXiv.

[10]  Lorrie Faith Cranor,et al.  An Empirical Analysis of Phishing Blacklists , 2009, CEAS 2009.

[11]  B. B. Gupta,et al.  A Survey of Phishing Email Filtering Techniques , 2013, IEEE Communications Surveys & Tutorials.

[12]  Ilango Krishnamurthi,et al.  An efficacious method for detecting phishing webpages through target domain identification , 2014, Decis. Support Syst..

[13]  Hicham Tout,et al.  Phishpin: An Identity-Based Anti-phishing Approach , 2009, 2009 International Conference on Computational Science and Engineering.

[14]  Stephen Groat,et al.  GoldPhish: Using Images for Content-Based Phishing Analysis , 2010, 2010 Fifth International Conference on Internet Monitoring and Protection.

[15]  Rachel Greenstadt,et al.  PhishZoo: Detecting Phishing Websites by Looking at Them , 2011, 2011 IEEE Fifth International Conference on Semantic Computing.

[16]  T Soumya. Phishing Attack Techniques , 2017 .

[17]  Tommy W. S. Chow,et al.  Textual and Visual Content-Based Anti-Phishing: A Bayesian Approach , 2011, IEEE Transactions on Neural Networks.

[18]  Fadi A. Thabtah,et al.  Phishing detection based Associative Classification data mining , 2014, Expert Syst. Appl..

[19]  T. Balamuralikrishna,et al.  Mitigating Online Fraud by Ant phishing Model with URL & Image based Webpage Matching , 2012 .