thesis 36 44 final

14
Presented by, Md. Merazul Islam (0507036) & Shuvradeb Barman Srijon (0507044) Supervised by, Mr. Muhammad Sheikh Sadi Assistant Professor Department of Computer Science and Engineering Khulna University of Engineering and Technology Khulna 9203, Bangladesh.

Upload: meraz-rizel

Post on 12-May-2015

492 views

Category:

Technology


1 download

DESCRIPTION

final thesis presentation slide

TRANSCRIPT

Page 1: thesis 36 44 Final

Presented by,Md. Merazul Islam (0507036)&Shuvradeb Barman Srijon (0507044)

Supervised by,Mr. Muhammad Sheikh SadiAssistant ProfessorDepartment of Computer Science and EngineeringKhulna University of Engineering and TechnologyKhulna 9203, Bangladesh.

Page 2: thesis 36 44 Final

Cyber Crime- the major concern. Internet fraud affects the rapidly growing

online services. E-commerce is the main target. Social communication sites and mail service

are also attack of them. Technical steps needed to defend them.

Page 3: thesis 36 44 Final

A criminal trick of stealing sensitive personal information.

Fooled user and push them to fall in the trick. Use social engineering and technical

strategy. Mainly, duplicate original web-pages. First describe in 1987.

Page 4: thesis 36 44 Final

Phishing attacks succeed if users fail to detect phishing sites.

Previous anti-phishing falls into four categories: Study on phishing Training people User interface Detection tools

Precious works deals with limited service. Our approach- Development of an automated

phishing detection method.

Page 5: thesis 36 44 Final

Similar appearance of web-page. IP based URL & Non Matching URL. URL contain abnormal characters. Mis-spelled URL. Using script or add-in to web browser to

cover the address bar.

Page 6: thesis 36 44 Final

According to APWG According to PhishTank

Phishes Verified as Valid

Suspected Phishes Submitted

Total 531086 Total 928206

Online 2770 Online 3021

Offline 528316 Offline 925174

Total phishing attack. (Up to 6th April 2010)Total phishing attack. (Up to 6th April 2010)

Page 7: thesis 36 44 Final

Social response Educating people. Changing habit.

Technical support Identify phishing site. Implementation of secure model. Browser alert. Eliminating phishing mails. Monitoring and Takedown.

Page 8: thesis 36 44 Final
Page 9: thesis 36 44 Final
Page 10: thesis 36 44 Final
Page 11: thesis 36 44 Final
Page 12: thesis 36 44 Final

Approach Accuracy Time (second)

IP based URL 100% 17

Exists in phishing

database

97% 59

Matching source content 81% 134

Abnormal condition 79% 51

Page 13: thesis 36 44 Final

Our approach reduces the ability of attackers to automate their attacks, cutting into their profitability.

By using the minimal knowledge base provided by the user-selected web-page, our system is able to compare potential phishing sites with real sites.

Performance and accuracy can be improved by using an image segmentation.

Flash contents can’t be validated whether phishing threat or not in our system.

Page 14: thesis 36 44 Final