CFP last date
20 January 2025
Reseach Article

Anti-phishing using Big Data

Published on June 2018 by Vanita Khamkar, Payal Ingale, Dhanraj Walunj
International Conference on Emerging Trends in Computing and Communication
Foundation of Computer Science USA
ICETCC2017 - Number 3
June 2018
Authors: Vanita Khamkar, Payal Ingale, Dhanraj Walunj
dcaaacf8-d584-41fd-bd35-18c3c1d977fb

Vanita Khamkar, Payal Ingale, Dhanraj Walunj . Anti-phishing using Big Data. International Conference on Emerging Trends in Computing and Communication. ICETCC2017, 3 (June 2018), 5-7.

@article{
author = { Vanita Khamkar, Payal Ingale, Dhanraj Walunj },
title = { Anti-phishing using Big Data },
journal = { International Conference on Emerging Trends in Computing and Communication },
issue_date = { June 2018 },
volume = { ICETCC2017 },
number = { 3 },
month = { June },
year = { 2018 },
issn = 0975-8887,
pages = { 5-7 },
numpages = 3,
url = { /proceedings/icetcc2017/number3/29471-c119/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Emerging Trends in Computing and Communication
%A Vanita Khamkar
%A Payal Ingale
%A Dhanraj Walunj
%T Anti-phishing using Big Data
%J International Conference on Emerging Trends in Computing and Communication
%@ 0975-8887
%V ICETCC2017
%N 3
%P 5-7
%D 2018
%I International Journal of Computer Applications
Abstract

Now a day's phishing attack has become one of the most serious issues faced by internet users, organizations and service providers. In phishing attack attacker tries to obtain the personal information of the users by using spoofed emails or by using fake websites or both. The internet community is still looking for the complete solution to secure the internet from such attacks. The users will be victim for this kind of activities, because phishing web pages looks very similar to real ones, so finds difficult to distinguish between the fake website and ones, detecting this kind of webpage is very difficult because for identification it takes several attributes into consideration which user might not knowing those things. The existing phishing detection systems are highly dependent on database and they are very time consuming also. In this proposed system, Hadoop-Map Reduce is used for fast retrieval of URL attributes, which plays a key role in identifying phishing web pages and it is known for its time efficiency and throughput also can gained using this.

References
  1. Fu, A. Y. ; Liu Wenyin; Xiaotie Deng, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)," Dependable and Secure Computing, IEEE Transactions on , vol. 3, no. 4, pp. 301,311, Oct. -Dec. 2006.
  2. Hong Bo; Wang Wei; Wang Liming; Geng Guanggang; Xiao Yali; Li Xiaodong; Mao Wei, "A Hybrid System to Find & Fight Phishing Attacks Actively," Web Intelligence and Intelligent Agent Technology (WI-IAT), 2011 IEEE/WIC/ACM International Conference on vol. 1, no. , pp. 506,509, 22-27 Aug. 2011.
  3. J. Dean and S. Ghemawat, "MapReduce: simplified data processing on large clusters," Communications of the ACM - 50th anniversary issue: 1958 - 2008, vol. 51, no. 1, pp. 107-113, 2008.
  4. Aburrous, M. ; Hossain, M. A. ; Dahal, K. ; Thabatah, F. , "Modelling Intelligent Phishing Detection System for E-banking Using Fuzzy Data Mining," CyberWorlds, 2009. CW '09. International Conference on, vol. , no. , pp. 265,272, 7-11 Sept. 2009.
  5. Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, Ian H. Witten (2009); The WEKA Data Mining Software: An Update; SIGKDD Explorations, Volume 11, Issue 1.
  6. Tanenbaum, A. S. (2010). Computer Networks (5th Edition). Prentice Hall; 5 edition (October 7, 2010).
Index Terms

Computer Science
Information Sciences

Keywords

Phishing Anti-phishing Hadoop Map Reduce Information Retrieval Data Mining.