RSIS International

Phishing Detection Approach on Social Media Networks

Submission Deadline: 29th November 2024
November 2024 Issue : Publication Fee: 30$ USD Submit Now
Submission Deadline: 20th November 2024
Special Issue on Education & Public Health: Publication Fee: 30$ USD Submit Now
Submission Deadline: 05th December 2024
Special Issue on Economics, Management, Psychology, Sociology & Communication: Publication Fee: 30$ USD Submit Now

International Journal of Research and Scientific Innovation (IJRSI) | Volume VII, Issue II, February 2020 | ISSN 2321–2705

Phishing Detection Approach on Social Media Networks

Daryoosh Mansoory1, Ashiqullah Alizai2, Abdullah Hamidi3
1Network Department, Computer Science Faculty, Herat University, Herat, Afghanistan
2,3Database Department, Computer Science Faculty, Herat University, Herat, Afghanistan

IJRISS Call for paper

Abstract: Internet technology is so extensive today. As an example, from online social networking to online banking, it’s made people’s lives easier. One in all the foremost important problems with the net technology is unwanted spam emails. The well-disguised phishing email comes in as a component of the spam and makes its entry into one’s inbox quite frequently nowadays. Here the various aspects of phishing attacks and some possible defenses as countermeasures are analyzed. Phishing could be a special form of network attack where the attacker creates a reproduction of an existing website to fool users in to submitting personal, financial, transaction or password data to what they think is their service provider’s website. Phishing is also a range of online fraud that aims to steal sensitive information like online passwords and master card information. To protect internet users against phishing, different anti-phishing techniques are proposed. During this paper we’ve reviewed various phishing and anti-phishing methods for detecting and preventing phishing attack.

Keywords:-Phishing, Information Technology, Anti-phishing, techniques, Social networking

I. INTRODUCTION

The world is roofed and ruled by technology. However, this technology may betray you when it’s vulnerable and will result in loss of essential data. A serious challenge and important issues in Information Technology and also the IT world is that the information security and protection of information. This involve the safety and data of the companies and also the government, your computer, tablet and cellphone that contain important and sensitive information that hackers and other criminals would like to have them.
1. Masse [9] points out that protection of sensitive information is vital in our modern society. Despite the increasing awareness of the threats to information security, there continues to be information security violations.