Open Access Open Access  Restricted Access Subscription or Fee Access

Source Code Block to Bring Down Phishing Attacks

Somraj Chowdhury, H. L. Gururaj


Cyber-attacks are the attacks carried out mainly over the internet and victims being the internet users. Phishing is a malicious activity aimed at collecting sensitive user information, by recreating an environment that has similarity in functionalities and appearance to the one that manages this information. Phishing most commonly occurs on the Web and mainly initiated via an email where the user is redirected to a malicious website that is a copy of the legitimate website and the objective of which is to capture the information to impersonate the user on the original Website and access the user’s personal confidential data. Seeing the truth here we suggest a preventive anti-phishing technique to keep the users away from to be victims of phishing attacks.


Cyber Attacks, Hacker, Internet, Phishing, Malicious.

Full Text:



PhishMe Report - https://www.darkreading. com/endpoint /91-- of - cyberattacks - start - with -a-phishing-email/d/d-id/1327704?.

A Machine - Learning Approach to Phishing Detection and Defense - Iraj Sadegh Amiri, O.A. Akanbi, E. Fazeldehkordi.

GoldPhish - Cyber Risk Management Solutions

Anti-phishing Extension for Google Chrome https // phishing-password-alert-google-chrome-extension.

Netcraft. Netcraft anti-phishing tool bar.

Wu, M., R. C. Miller and S. L. Garfinkel. 2006. Do Security Toolbars Actually Prevent Phishing Attacks? In the Conference on Human Factors in Computing Systems. http: //

Large-Scale Automatic Classification of Phishing Pages, Colin Whittaker, Brian Ryner and Marria Nazif.

Fette, I., N. Sadeh and A. Tomasic. Learning to Detect Phishing Emails. 2006. ISRI Technical report, CMU-ISRI- 06-112. Retrieved Sep 2, 2006, http://reportsarchive. /CMU-ISRI-06-112.pdf.

Phishing Attacks 2017 - /opinions /why-2017-phishing-attacks-teach/.

Notable Phishing Scams - http://resources. /top-ten-phishing-scams/# gref.

R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In Proceedings of the SIGCHI conference on Human Factors in computing systems, ACM, 2006.

Microsoft-ASSOCHAM survey - https:// economictimes. / tech/ites/bpo - firms - lack-seriousness - on - cyber - fraud - threats-assocham-microsoft-survey/articleshow / 63529636.cms


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.