International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 155 | Views: 225

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016


Analysis of Web Phishing Methods

Rishav Shaw | Utkarsh Opalkar | Nayan Mathur | R. Manjula [12]


Abstract: Phishing is considered as a form of web threat and is the act of impersonating a website of an honest enterprise aiming to obtain users confidential credentials such as usernames, passwords and other private or sensitive information. The Internet today is a medium of our everyday social and financial activities. Internet is also a platform for large and small organizations to expand business via e-commerce. As a result, the number of customers who rely on the Internet to perform procurements is increasing dramatically. Unimaginably large amounts of money are transferred through the Internet every day. This amount of money is very tempting to fraudsters and hackers. Hence, Internet users may be vulnerable to different types of web threats, which may cause financial damages, identity theft, loss of private information, brand reputation damage and loss of customers confidence in e-commerce and online banking. In this survey paper we shall discuss existing phishing techniques in detail. We shall also take a look at 2 important algorithms that deal with detecting and preventing phishing attacks along with their effectiveness and shortcomings in order to carry out a Comprehensive study. The motivation behind this paper is to contribute in enhancing Anti-Phishing methods and preventing a dominant type of crime in todays day and age Cybercrime.


Keywords: Internet, Web Phishing, Cyber Crime, E-commerce, Identity theft


Edition: Volume 5 Issue 5, May 2016,


Pages: 566 - 576


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top