April 2018 Issue Vol.8 No.4
Mariadas Ronnie C.P
Asst. Professor, Dept. of MCA, SCMS School of Technology and Management,SSTM, Muttom,Aluva,Kerala,India
Jincy Rachel Varghese
P G Scholar, Dept. of MCA, SCMS School of Technology and Management,SSTM, Muttom,Aluva,Kerala,India
Abstract: Today,the most common method used by many intruders to get the personal information about various users is by sending emails. This method is known as phishing. In this, the intruders try to gain vital information about the users. It may include passwords, username, bank account details and so on. Today, there are different kinds of phishing techniques that have been developed which are difficult to trace even for an educated person. One of the main challenging issues in this area is to detect phishing with high accuracy. This is because the phishing website and the corresponding website look so similar in appearance. Some of the features set like text format, text content, CSS, HTML tags, image and so forth are utilized by various phishing techniques based on visual similarity.
Keywords:anti-phishing, history, types of phishing, link count checker.