A Smart Approach to Avoid Phishing

Paras Gandhi, Bharati Vidyapeeth College of Engineering; Osho Tripathi ,BVUCOE

Phishing, Classification Algorithm, Machine Learning

This research reports on the smarter way to tackle phishing and various web attacks. In addition, observations on the outcomes obtained from examination, group-project coursework, and informal feedback from victims have been analysed. This resulted in uncovering the same pattern and habits of the victims and how to utilize them to improve their security. This study led to devise specific pattern recognition using classification algorithm of machine learning to improve the user’s security.
    [1] Jayakumar, N., Iyer, M.S., Joshi, S.D. and Patil, S.H., A Mathematical Model in Support of Efficient offloading for Active Storage Architectures. [2] Naveenkumar, J. and Joshi, S.D., 2015. Evaluation of Active Storage System Realized through MobilityRPC. [3] Naveenkumar, J., Bhor, M.P. and Joshi, S., 2011. A self-process improvement for achieving high software quality. International Journal of Engineering Science and Technology (IJEST), 3(5), pp.3850-3053. [4] Salunkhe, R. and Jaykumar, N., 2016, June. Query Bound Application Offloading: Approach towards Increase Performance of Big Data Computing. In Journal of Emerging Technologies and Innovative Research (Vol. 3, No. 6 (June-2016)). JETIR. [5] BVDUCOE, B., 2011. Iris Image Pre-Processing and Minutiae Points Extraction. International Journal of Computer Science & Information Security. [6] Archana, R.C., Naveenkumar, J. and Patil, S.H., 2011. Iris Image Pre-Processing and Minutiae Points Extraction. International Journal of Computer Science and Information Security, 9(6), p.171. [7] Kumar, N., Angral, S. and Sharma, R., 2014. Integrating Intrusion Detection System with Network Monitoring. International Journal of Scientific and Research Publications, 4, pp.1-4. [8] Jayakumar, M.N., Zaeimfar, M.F., Joshi, M.M. and Joshi, S.D., 2014. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET). Journal Impact Factor, 5(1), pp.46-51. [9] Kakamanshadi, G., Naveenkumar, J. and Patil, S.H., 2011. A Method to Find Shortest Reliable Path by Hardware Testing and Software Implementation. International Journal of Engineering Science and Technology (IJEST), ISSN, pp.0975-5462. [10] Namdeo, J. and Jayakumar, N., 2014. Predicting Students Performance Using Data Mining Technique with Rough Set Theory Concepts. International Journal, 2(2). [11] Jayakumar, N., Singh, S., Patil, S.H. and Joshi, S.D., 2015. Evaluation Parameters of Infrastructure Resources Required for Integrating Parallel Computing Algorithm and Distributed File System. IJSTE-Int. J. Sci. Technol. Eng, 1(12), pp.251-254. [12] Salunkhe, R., Kadam, A.D., Jayakumar, N. and Thakore, D., 2016, March. In search of a scalable file system state-of-the-art file systems review and map view of new Scalable File system. In Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference on (pp. 364-371). IEEE. [13] Naveenkumar, J., Makwana, R., Joshi, S.D. and Thakore, D.M., 2015. Offloading Compression and Decompression Logic Closer to Video Files Using Remote Procedure Call. Journal Impact Factor, 6(3), pp.37-45. [14] Jayakumar, N., 2014. Reducts and Discretization Concepts, tools for Predicting Student’s Performance. Int. J. Eng. Sci. Innov. Technol, 3(2), pp.7-15.
Paper ID: GRDJEV02I060131
Published in: Volume : 2, Issue : 6
Publication Date: 2017-06-01
Page(s): 198 - 204