Abstract
In the area of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail, and it often directs users to enter details at a fake website which almost identical to original one. Phishing filters help Internet users avoid scams that create fake websites. Such sites ask for personal information, including banking passwords or offer software downloads. This paper concerned with anti-phishing techniques with the help of hardware device. Anti phishing software is designed to track websites and monitor activity, any suspicious behavior can be automatically reported and even reviewed as a report after a period of time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Madhuri, M., Yeseswini, K., Vidya Sagar, U.: Intelligent phishing website detection and prevention system by using link guard algorithm. Int. J. Commun. Netw. Secur. 2, 9–15 (2013)
Carmona, P.L., Sánchez, J.S., Fred, A.L.N.: Pattern Recognition—Applications and Methods, pp. 149–158. Springer, New York (2013)
Padmos, A.: A Case of Sesame Seeds Growing and Nurturing Credentials in the Face of Mimicry, pp. 33–45. Royal Holloway, University of London, Egham (2011)
James, L.: Phishing Exposed, pp. 50–56. Syngress Publishing, USA (2005). ISBN 159749030X
Cranor, L., Egelman, S., Hong, J., Zhang, Y.: Phinding Phish: An Evaluation of Anti-Phishing Toolbars. Pittsburgh (2006), pp. 1–17
EarthLink Inc.: EarthLink toolbar. Accessed 9 Nov 2006
eBay Inc.: Using eBay toolbar’s account guard. Accessed 13 June 2006
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Solanki, A., Dogiwal, S.R. (2015). Implementation of an Anti-phishing Technique for Secure Login Using USB (IATSLU). In: Jain, L., Behera, H., Mandal, J., Mohapatra, D. (eds) Computational Intelligence in Data Mining - Volume 1. Smart Innovation, Systems and Technologies, vol 31. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2205-7_21
Download citation
DOI: https://doi.org/10.1007/978-81-322-2205-7_21
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2204-0
Online ISBN: 978-81-322-2205-7
eBook Packages: EngineeringEngineering (R0)