Phishing Attack Detecting System Using DNS and IP Filtering
DOI:
https://doi.org/10.51983/ajcst-2023.12.1.3552Keywords:
HTTPS, IP, DNS, Phishing, Cyber SecurityAbstract
This study examines the different types of phishing attacks, which are a major threat to digital security. Phishing involves the use of fraudulent messages to deceive recipients, including email spoofing, spear phishing, phone phishing, clone phishing, pharming, HTTP phishing, man-in-the-middle attacks, and fast-flux phishing. Attackers can gather information about their targets from public sources such as social media networks, including work history, interests, and activities. The study developed a filtered website that detects fraudulent links based on the internet protocol (IP), register date, and domain name server (DNS) of each website. While further research is needed to improve the effectiveness of the site, this marks an important step towards enhancing digital security.
References
P. Gillin, "The history of phishing" [Online]. Available: https://www.verizon.com/business/resources/articles/s/the-history-of-phishing. Accessed on 19 February 2023.
By Gatefy, Updated at March 19, 2021 gatefy.com [Online]. Available: [https://gatefy.com/blog/key-points-verizon-data-breach-report-dbir-2020/#:~:text=According%20to%20the%20report%2C%20social,22%25%20of%20 cases%20of%20breaches.&text=In%20cases%20of%20breaches%20involving,Personal%20data](https://gatefy.com/blog/key-points-verizon-data-breach-report-dbir-2020/#:~:text=According%20to%20the%20report%2C%20social,22%25%20of%20 cases%20of%20breaches.&text=In%20cases%20of%20breaches%20involving,Personal%20data).
N. Agrawal and S. Singh, "Origin (dynamic blacklisting) based spammer detection and spam mail filtering approach," 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC), Moscow, pp. 99-104, 2016.
J. V. Chandra, N. Challa and S. K. Pasupuleti, "A Practical Approach to E-mail Spam Filters to Protect Data from Advanced Persistent Threat," 2016 International Conference on Circuit, Power and Computing Technologies (1CCPCT), Nagercoil, pp. 1-5, 2016.
A. K. Sharma and R. Yadav, "Spam Mails Filtering Using Different Classifiers with Feature Selection and Reduction Technique," 2015 Fifth International Conference on Communication Systems and Network Technologies, Gwalior, pp. 1089-1093, 2015.
J. Thomas, N. S. Raj and P. Vinod, "Towards filtering spam mails using dimensionality reduction methods," 2014 5th International Conference- Confluence the Next Generation Information Technology Summit (Confluence), Noida, pp. 163-168, 2014.
H. AIRashid, R. AIZahrani and E. EIQawasmeh, "Reverse of e-mail spam filtering algorithms to maintain e-mail deliverability," 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), Bangkok, pp. 297-300, 2014.
G. R. Kumar, S. Gunasekaran and V. A S, "URL Phishing Data Analysis and Detecting Phishing Attacks using Machine Learning in NLP," International Journal of Engineering Applied Sciences and Technology (IJEAST), 70-75, 2018.
B. Miller, "Proposals for Holistic Security in Preventing Email Phishing Attacks."
A. Ferreira and P. M. V. Marques, "Phishing Through Time: A Ten-Year Story based on Abstracts," In ICISSP, pp. 225-232, January 2018.
S. Nasiri, M. T. Sharabian and M. Aajami, "Using combined one-time password for prevention of phishing attacks," Engineering, Technology & Applied Science Research, Vol. 7, No. 6, pp. 2328-2333, 2017.
V. Bhavsar, A. Kadlak and S. Sharma, "Study on phishing attacks," Int. J. Comput. Appl., Vol. 182, pp. 27-29, 2018.
O. K. Sahingoz, S. I. Baykal and D. Bulut, "Phishing detection from urls by using neural networks," Computer Science & Information Technology (CS & IT), pp. 41-54, 2018.
A. Alsayed and A. Bilgrami, "E-banking security: Internet hacking, phishing attacks, analysis and prevention of fraudulent activities," Int. J. Of Emerg. Techn. and Adv. Activ, Vol. 7, No. 1, pp. 109-115, 2017.
G. J. W. Kathrine, P. M. Praise, A. A. Rose and E. C. Kalaivani, "Variants of phishing attacks and their detection techniques," In 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), IEEE, pp. 255-259, April 2019.
C. Parulekar, "Minimize phishing attacks: Securing spear attacks," International Research Journal of Engineering and Technology, Vol. 6, No. 6, pp. 3054-3058, 2019.
A. A. Andryukhin, "Phishing attacks and preventions in blockchain based projects," In 2019 International Conference on Engineering Technologies and Computer Science (EnT), IEEE, pp. 15-19, March 2019.
A. K. Jain, S. K. Yadav and N. Choudhary, "A novel approach to detect spam and smishing SMS using machine learning techniques," International Journal of E-Services and Mobile Applications (IJESMA), Vol. 12, No. 1, pp. 21-38, 2020.
C. Singh, "Phishing Website Detection Based on Machine Learning: A Survey," In 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), IEEE, pp. 398-404, March 2020.
Aldwairi, M., & Tawalbeh, L. A. (2020). "Security techniques for intelligent spam sensing and anomaly detection in online social platforms." International Journal of Electrical and Computer Engineering, Vol. 10, No. 1, pp. 275.
A. Basit, M. Zafar, X. Liu, A. R. Javed, Z. Jalil and K. Kifayat, "A comprehensive survey of AI-enabled phishing attacks detection techniques," Telecommunication Systems, Vol. 76, No. 1, pp. 139-154, 2021.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.