Professional Documents
Culture Documents
Online Detection and Prevention From Phishing Attacks: Dr. Ambedkar Institute OF
Online Detection and Prevention From Phishing Attacks: Dr. Ambedkar Institute OF
BACHELOR OF TECHNOLOGY
INFORMATION TECHNOLOGY
Final Year
PRESENTED BY…..
RAHUL PANDEY-1716613039 SUBMITTED TO:-
RAHUL PANDEY-1716613040
Mr Kapil Pandey
TIKENDRA KUMAR-1716613058
NITESH KR JAISWAL-1716613035 Head of Department, IT
CONTENTS
Introduction
Module’s Explanation
System Requirement Specifications
Advantages and Disadvantages
References
Introduction:
Phishing is the process of hacking user’s security
information like bank accounts, credit card numbers
…etc. In this process users will receive emails with
hyperlinks with information like it is sent from
banks and when user clicks on links users will be
routed to a unknown website which ask for bank
account details like password changes, credit card
details.
When users enter his details hackers will
capture that information at server side and use that
information for transferring money from bank
accounts.
In order to solve this problem we use
MODULE EXPLANATION
There are three modules involved in this project:
› Creation of a mail system and database operations
› Composes, send and receive a mail
› Implementation of the Link Guard algorithm
MODULE 1
This module deals with the user interface
for the home page, sign-in, sign-up and forgot
your password pages.This module enables a
new user to Sing-Up. It also enables an
existing user to Sign-In. The user may use the
Forget password link if he did forget his
password. The password is retrieved on the
basis of security question and answer given by
the user. Database operation manages the
users. Every time a new user signs in his
details are written in to the database.
FLOW CHART
•USER LOGIN
MODULE 2
Software Requirements
The minimum requirements for detection and
prevention of phishing attacks are:
Operating System : Windows 2000/XP
Documentation Tool : Ms word 2000
Hardware Requirements
The minimum hardware requirements are:
Hard disk : 20 GB and above
RAM : 256 MB and above
Processor speed : 1.6 GHz and above
Advantages
The approach can be used by many E-commerce to enhance good
customer relationship.
It will decrease online fraud cases throughout the world.
Disdvantages
If the internet connection fails, system would not work.
Reference Link
EarthLink. ScamBlocker. http://www.earthlink.net/software/free/toolbar/
David Geer. Security Technologies Go Phishing. IEEE Computer,
38(6):18–21, 2005
THANK YOU
Presented
By
RAHUL PANDEY
RAHUL PANDEY
TIKENDRA KUMAR
NITESH KR JAISWAL