Professional Documents
Culture Documents
PRESENTED BY:-
SHVETA AND SUCHITRA YADAV
PRESENTED TO:-
PROF. AJAY KR. SRIVASTAVA
PRESENTATION FLOW
INTRODUCTION
PROBLEM DEFINITION
INNOVATION
PROPOSED METHODOLOGY
MODULE DESCRYPTION
REQUIREMENT ANALYSIS
APPLICATION
INTRODUCTION
Phishing is new word produced from ‘fishing’.
Phishing is the fraudulent attempt to obtain sensitive information or data, such as user
name, password and credit card details.
In phishing attacker allure users to visit a fake website by sending them faked emails or
text messages and get victim’s personal information such as user name , password,
national security id etc.
These sensitive information is even used for identity theft attacks e.g. transfer money
from victim’s bank account.
.
PROBLEM DEFINITION
Phishing websites are duplicate web pages created to mimic real websites in order to deceive
people to get their personal information.
Due to the adaptability of the phisher tactics with little cost, detecting and identifying
phishing websites is a complex and dynamic problem.
Phishing is typically carried out by email spoofing, instant messaging and text messaging.
These messages or emails direct users to the fraudulent websites and often deirects users to
enter personal information.
INNOVATION IN THE PROJECT
PROPOSED METHODOLOGY
URL Dataset:-The data of URLs is obtained from Phishtank website, where Phishtank is a anti-
phishing website.
Pre-Processing of data: The data is pre processed to help extract feature values from the URL. It
converts the data into structured format.
Feature extraction: It extracts the feature value through the predefined URL-based feature.
Training: The training data is used to make sure that machine recognizes the URL pattern in the data.
The cross-validation data is used to ensure better accuracy and efficiency of the algorithm used to train
the machine.
Testing: The test data is used to see how well the machine can predict new answers based on its training.
Classification process: Classification process is the final step. In this step, the classifier detects whether
the given URL is legitimate URL or a phishing URL on the basis of traning data.
MODULE DESCRIPTION
REGISTRATION:- The user has to enter his user name , e-mail id and password in order to register
him . In order to access further features the visitor has to register himself.
LOG IN:- After successful registration the user/admin can enter their credentials to log in into the
system.
ADD TO BLOCKLUST:- This module is only available to the admin Here, the admin adds the
malicious websites to the blocklist . If the site is blacklisted it prevents the user from accessing it.
CHECK WEBSITE:- Here the user enters URL to check whether it is legitimate or not. If the site is
legitimate it allows the user to access it otherwise a message is displayed to tell the user that the site is
blacklisted. i.e. it is a phishing website.
FEEDBACK:- Here the user can give his opinion on the working of the website.
CHANGE PASSWORD:- The admin may change his password for security purpose by entering the old
and new password.
REQUIREMET ANALYSIS
SOFTWARE REQUIREMENT
WINDOWS 7 OR HIGHER
VISUAL STUDIO 2010
SQL SERVER 2008
HARDWARE REQUIREMENTS
PROCESS – CORE I3 OR ABOVE
HARD DISK SPACE AVAILABLE – 10 GB
MEMORY – 4 GB RAM
INTERNET CONNECTION
TECHNOLOGY AND LANGUAGES USED
PYTHON
MACHINE LEARNING
APPLICATION
This website have biggest application in the pandemic situations like Covid -19.
As in this covid-19 many fake website or phishing websites are available in the current scenario
which are being used to steal the necessary information of users.
These websites are being used on the name of donation and providing test kits. Hackers have
created the mimic websites of Indian government websites.
.
LIMITATIONS