Skip to main content

Implementation of an Anti-phishing Technique for Secure Login Using USB (IATSLU)

  • Conference paper
  • First Online:
Computational Intelligence in Data Mining - Volume 1

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 31))

Abstract

In the area of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail, and it often directs users to enter details at a fake website which almost identical to original one. Phishing filters help Internet users avoid scams that create fake websites. Such sites ask for personal information, including banking passwords or offer software downloads. This paper concerned with anti-phishing techniques with the help of hardware device. Anti phishing software is designed to track websites and monitor activity, any suspicious behavior can be automatically reported and even reviewed as a report after a period of time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Madhuri, M., Yeseswini, K., Vidya Sagar, U.: Intelligent phishing website detection and prevention system by using link guard algorithm. Int. J. Commun. Netw. Secur. 2, 9–15 (2013)

    Google Scholar 

  2. Carmona, P.L., Sánchez, J.S., Fred, A.L.N.: Pattern Recognition—Applications and Methods, pp. 149–158. Springer, New York (2013)

    Book  MATH  Google Scholar 

  3. Padmos, A.: A Case of Sesame Seeds Growing and Nurturing Credentials in the Face of Mimicry, pp. 33–45. Royal Holloway, University of London, Egham (2011)

    Google Scholar 

  4. James, L.: Phishing Exposed, pp. 50–56. Syngress Publishing, USA (2005). ISBN 159749030X

    Google Scholar 

  5. Cranor, L., Egelman, S., Hong, J., Zhang, Y.: Phinding Phish: An Evaluation of Anti-Phishing Toolbars. Pittsburgh (2006), pp. 1–17

    Google Scholar 

  6. EarthLink Inc.: EarthLink toolbar. Accessed 9 Nov 2006

    Google Scholar 

  7. eBay Inc.: Using eBay toolbar’s account guard. Accessed 13 June 2006

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Solanki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Solanki, A., Dogiwal, S.R. (2015). Implementation of an Anti-phishing Technique for Secure Login Using USB (IATSLU). In: Jain, L., Behera, H., Mandal, J., Mohapatra, D. (eds) Computational Intelligence in Data Mining - Volume 1. Smart Innovation, Systems and Technologies, vol 31. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2205-7_21

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2205-7_21

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2204-0

  • Online ISBN: 978-81-322-2205-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics