This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
A Study on Browser-Based Anti-Phishing Tools
Authors
  Beena Kurian,  Sangeetha Sangam,  Beena M V
Abstract
Phishing is the act of attempting to acquire sensitive information such as usernames, passwords, credit card details etc. by impersonating trustworthy entities in an electronic communication. Phishing attacks can range from and not limited to social web sites, auction sites, banks, online payment processors etc. Such areas are commonly used to lure the unsuspecting public. In order to prevent such attacks, several anti-phishing tools can be employed. Anti-phishing software consists of computer programs that attempt to identify phishing content contained in websites and e-mail. It is often integrated with web browsers and email clients as a toolbar that displays the real domain name of the website the viewer is visiting. This helps to prevent fraudulent websites from masquerading as other legitimate web sites. Anti-phishing functionality may also be included as a built-in capability of some web browsers. There are currently various freely available tools to combat phishing, many of which are web browser extensions that warn users when they are browsing a suspected phishing site. This paper is a comprehensive study of the various browser-based anti-phishing tools including toolbars, and plug-ins currently employed in a world-wide basis.
Keywords- Anti-Phishing, Plug-in, Add-ons, Blacklist and Whitelist
Publication Details
Unique Identification Number - IJEDR1401086Page Number(s) - 484-497Pubished in - Volume 2 | Issue 1 | March 2014DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  Beena Kurian,  Sangeetha Sangam,  Beena M V,   "A Study on Browser-Based Anti-Phishing Tools", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.2, Issue 1, pp.484-497, March 2014, Available at :http://www.ijedr.org/papers/IJEDR1401086.pdf
Article Preview
|
|
||||||
|